Submit #699246: code-projects Employee Profile Management System published November 15, 2025 Cross Site Scriptinginfo

Titelcode-projects Employee Profile Management System published November 15, 2025 Cross Site Scripting
BeschreibungSummary The vulnerability exists in the personnel profile viewing and reporting components due to improper output encoding. User-controlled fields (such as address, school names, degrees, etc.) stored in the database are rendered directly in view_personnel.php and print_personnel_report.php without HTML escaping, which allows attackers to inject arbitrary JavaScript. Root Cause The application fails to sanitize or encode user-controlled input when displaying personnel information. Fields such as per_address, bs_school, ms_school, and dr_school are output using raw PHP echo statements like: <?php echo $row['per_address']; ?> Because there is no htmlspecialchars() or encoding function, attacker-supplied payloads such as <script>...</script> are executed in the victim’s browser. Reproduction Login as a normal user who has permission to add or edit personnel profiles. Create or edit a personnel record and set the Address field (per_address) to: <script>alert('XSS');</script> Save the profile, then open either of the following pages: view_personnel.php?per_id=<id> print_personnel_report.php?per_id=<id> The JavaScript payload triggers immediately because the application prints the malicious value directly inside HTML without escaping. Impact This vulnerability allows an attacker to execute arbitrary JavaScript in the browser of any administrator or user who views personnel data or prints reports. Possible consequences include: Session hijacking Credential theft Unauthorized actions via CSRF-like behavior Injection of backdoor scripts into report pages Manipulation of displayed personnel data Because the payload is stored, the XSS persists across sessions and affects all viewers of the compromised personnel record.
Quelle⚠️ https://github.com/shenxianyuguitian/employee-management-XSS
Benutzer
 xuanyuesanshi (UID 88126)
Einreichung21.11.2025 08:24 (vor 5 Monaten)
Moderieren06.12.2025 18:20 (15 days later)
StatusAkzeptiert
VulDB Eintrag334614 [code-projects Employee Profile Management System 1.0 /view_personnel.php per_address/dr_school/other_school Cross Site Scripting]
Punkte20

Do you know our Splunk app?

Download it now for free!