VYPR
Low severity2.4NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7296

CVE-2026-7296

Description

A vulnerability was found in SourceCodester Pizzafy Ecommerce System 1.0. This affects the function save_order of the file /admin/ajax.php?action=save_order. Performing a manipulation of the argument first_name results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in SourceCodester Pizzafy Ecommerce System 1.0 allows remote attackers to inject arbitrary JavaScript via the first_name parameter in the save_order function.

Vulnerability

Overview

CVE-2026-7296 describes a stored cross-site scripting (XSS) vulnerability in the SourceCodester Pizzafy Ecommerce System version 1.0. The flaw resides in the save_order function within /admin/ajax.php?action=save_order. The application fails to properly sanitize the first_name argument before storing it, allowing an attacker to inject arbitrary JavaScript code.

Exploitation

The attack can be carried out remotely without requiring authentication, as the vulnerable endpoint is accessible over the network. A proof-of-concept exploit has been publicly released [1], demonstrating how a crafted first_name parameter can be submitted to trigger the XSS. The injected script executes in the context of the admin panel when the stored order data is viewed.

Impact

Successful exploitation enables an attacker to execute arbitrary JavaScript in the browser of an administrator viewing the orders. This can lead to session hijacking, theft of sensitive data, or further compromise of the admin interface. Given the low CVSS score (2.4), the impact is considered limited, but the public availability of exploit code increases the risk for unpatched installations.

Mitigation

As of the publication date, no official patch has been released by SourceCodester. Administrators should sanitize user input in the first_name field and consider applying input validation and output encoding to prevent XSS attacks. Until a fix is available, restricting access to the admin panel and monitoring for suspicious activity are recommended.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.