| Título | code-projects School Fees Payment System 1.0 Cross Site Scripting |
|---|
| Descripción | During the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'sname', 'contact', 'about', 'emailid', 'transcation_remark' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity. |
|---|
| Fuente | ⚠️ https://github.com/tuooo/CVE/issues/18 |
|---|
| Usuario | DS_Leo (UID 86084) |
|---|
| Sumisión | 2025-06-20 18:00 (hace 10 meses) |
|---|
| Moderación | 2025-06-24 10:11 (4 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 313741 [code-projects School Fees Payment System 1.0 /student.php sname/contact/about/emailid/transcation_remark secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|