| عنوان | yangzongzhuan RuoYi <=4.8.1 cross site scripting |
|---|
| الوصف | A stored Cross-Site Scripting (XSS) vulnerability exists in the `/system/notice/edit` route of the affected application, specifically in the `editSave` method handling this endpoint. The application fails to properly sanitize user-supplied input before storing it into the backend database. As a result, malicious payloads submitted by attackers are persistently stored and subsequently executed in the browser context of users accessing the relevant functionality. |
|---|
| المصدر | ⚠️ https://github.com/yangzongzhuan/RuoYi/issues/298 |
|---|
| المستخدم | ez-lbz (UID 87033) |
|---|
| ارسال | 26/07/2025 10:53 AM (9 أشهر منذ) |
|---|
| الاعتدال | 10/08/2025 05:59 PM (15 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 319381 [yangzongzhuan RuoYi حتى 4.8.1 /system/notice/edit noticeTitle/noticeContent البرمجة عبر المواقع] |
|---|
| النقاط | 20 |
|---|