| عنوان | eXtplorer eXtplorer (PHP file manager) 2.1.15 Cross-Site Scripting (Stored) |
|---|
| الوصف | eXtplorer 2.1.15 is vulnerable to stored cross-site scripting via a crafted filename. The list view HTML-escapes names, but multiple action flows render the filename without proper encoding. Interacting with a malicious file—Move/Copy, double-click rename (in-place), Edit, or Delete—executes attacker-controlled JS in the victim’s browser. The payload persists on disk and affects any user who can access the shared directory, enabling cross-user action hijacking and, in some deployments, creation/modification of web-served files (potential path to web shell).
|
|---|
| المصدر | ⚠️ https://github.com/soerennb/extplorer/issues/33 |
|---|
| المستخدم | NomanProdhan (UID 92021) |
|---|
| ارسال | 25/10/2025 04:11 PM (6 أشهر منذ) |
|---|
| الاعتدال | 12/11/2025 01:40 PM (18 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 332185 [soerennb eXtplorer حتى 2.1.15 Filename البرمجة عبر المواقع] |
|---|
| النقاط | 20 |
|---|