| Title | PHPGurukul Apartment Visitors Management System 1.0 Cross Site Scripting |
|---|
| Description | - A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Apartment Visitors Management System. The vulnerability exists due to improper sanitization and lack of output encoding on the visname field submitted via a POST request to /visitors-form.php.
- This user-supplied input is saved and later rendered directly into HTML content on /bwdates-reports.php without any escaping or filtering. This allows attackers to inject malicious JavaScript that will execute in the browser of any user who loads the page — including administrators. |
|---|
| Source | ⚠️ https://github.com/HieuGITLAB/my-cves/issues/5 |
|---|
| User | ppzzaarr (UID 51209) |
|---|
| Submission | 07/16/2025 07:01 AM (7 months ago) |
|---|
| Moderation | 07/18/2025 07:34 PM (3 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 316921 [PHPGurukul Apartment Visitors Management System 1.0 HTTP POST Request /bwdates-reports.php visname cross site scripting] |
|---|
| Points | 20 |
|---|