| Título | PHPGurukul Apartment Visitors Management System 1.0 Cross Site Scripting |
|---|
| Descripción | - A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Apartment Visitors Management System. The vulnerability exists due to improper sanitization and lack of output encoding on the adminname field submitted via a POST request to /admin-profile.php.
- This user-supplied input is saved and later rendered directly into HTML content on /admin-profile.php without any escaping or filtering. This allows attackers to inject malicious JavaScript that will execute in the browser of any user who loads the page — including administrators. |
|---|
| Fuente | ⚠️ https://github.com/HieuGITLAB/my-cves/issues/10 |
|---|
| Usuario | ppzzaarr (UID 51209) |
|---|
| Sumisión | 2025-07-16 09:01 (hace 9 meses) |
|---|
| Moderación | 2025-07-19 06:04 (3 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 316971 [PHPGurukul Apartment Visitors Management System 1.0 HTTP POST Request /admin-profile.php adminname secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|