| Título | SapneshNaik Student-Management-System V1.0 Reflected XSS |
|---|
| Descripción | The XSS vulnerability exists in the project’s `index.php` and `admin.php` files (root directory of the project). Both pages have the same backend processing logic for the `error` GET parameter, leading to the same XSS vulnerability.
The XSS vulnerability is caused by improper handling of the user-controlled `error` GET parameter in both `index.php` and `admin.php` files. The backend code directly outputs the value of the`error` parameter to the HTML page without any input validation, sanitization, or encoding (e.g., using the `htmlspecialchars()` function). This allows attackers to construct malicious XSS payloads, which are executed when the page is rendered in the user’s browser. |
|---|
| Fuente | ⚠️ https://github.com/duckpigdog/CVE/blob/main/XSS%E2%80%94%E2%80%94SapneshNaik_Student-Management-System.md |
|---|
| Usuario | suc2es2 (UID 90074) |
|---|
| Sumisión | 2026-02-07 19:40 (hace 3 meses) |
|---|
| Moderación | 2026-02-21 18:28 (14 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 347313 [SapneshNaik Student Management System hasta f4b4f0928f0b5551a28ee81ae7e7fe47d9345318 index.php Error secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|