إرسال #601612: code-projects School Fees Payment System 1.0 Cross Site Scriptingالمعلومات

عنوانcode-projects School Fees Payment System 1.0 Cross Site Scripting
الوصفDuring the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'sname', 'contact', 'about', 'emailid', 'transcation_remark' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity.
المصدر⚠️ https://github.com/tuooo/CVE/issues/18
المستخدم
 DS_Leo (UID 86084)
ارسال20/06/2025 06:00 PM (10 أشهر منذ)
الاعتدال24/06/2025 10:11 AM (4 days later)
الحالةتمت الموافقة
إدخال VulDB313741 [code-projects School Fees Payment System 1.0 /student.php sname/contact/about/emailid/transcation_remark البرمجة عبر المواقع]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!