Submit #597093: SourceCodester My Food Recipe 1.0 Stored Cross Site Scriptinginfo

TitelSourceCodester My Food Recipe 1.0 Stored Cross Site Scripting
BeschreibungA Stored Cross-Site Scripting (XSS) vulnerability was discovered in the My Food Recipe application developed by SourceCodester. The vulnerability resides in the "Add Recipe" functionality, where user-supplied input is improperly sanitized before being stored and rendered, allowing arbitrary JavaScript to be executed in the context of other users' sessions. Affected Field: recipe_name (input type: text) Affected Endpoint: /endpoint/add-recipe.php (via #addRecipeModal modal form) Input Vector: POST request via form submission Impact: Stored JavaScript payload is triggered when the page loads or when the data is viewed. Steps to Reproduce Open the modal by clicking the Add Recipe button: <button type="button" class="btn btn-add-food btn-secondary" data-toggle="modal" data-target="#addRecipeModal">Add Recipe</button> In the Recipe Name field, insert the following payload: <script>alert('PoC VulDB My Food Recipe')</script> Fill the remaining fields with valid data (e.g., category, ingredients, procedure) and click Save changes. Upon submitting the form, the payload is stored in the database. Whenever the recipe data is rendered again (e.g., recipe listing or detail views), the JavaScript is executed, confirming a persistent (stored) XSS vulnerability.
Quelle⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README4.md
Benutzer
 RaulPACXXX (UID 84502)
Einreichung14.06.2025 19:39 (vor 10 Monaten)
Moderieren19.06.2025 12:39 (5 days later)
StatusAkzeptiert
VulDB Eintrag313340 [SourceCodester My Food Recipe 1.0 Add Recipe Page /endpoint/add-recipe.php addRecipeModal Name Cross Site Scripting]
Punkte20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!