Vulnerability Description
A security flaw has been discovered in code-projects Simple Food Ordering System 1.0. This issue affects some unknown processing of the file /addproduct.php. Performing manipulation of the argument photo results in unrestricted upload. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Simple Food Ordering System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/tinggeogle01-lang/cve/issues/1ExploitThird Party Advisory
- https://vuldb.com/?ctiid.330214Permissions RequiredVDB Entry
- https://vuldb.com/?id.330214Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.674562Third Party AdvisoryVDB Entry
FAQ
What is CVE-2025-12378?
CVE-2025-12378 is a vulnerability with a CVSS score of 7.3 (HIGH). A security flaw has been discovered in code-projects Simple Food Ordering System 1.0. This issue affects some unknown processing of the file /addproduct.php. Performing manipulation of the argument ph...
How severe is CVE-2025-12378?
CVE-2025-12378 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-12378?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Simple Food Ordering System.