| Título | bagisto v2.3.15 Cross Site Scripting |
|---|
| Descripción | The Bagisto application is vulnerable to Stored Cross-Site Scripting (Stored XSS) via the Custom Scripts configuration feature.
An authenticated low-privileged administrative user (e.g., a custom role with limited permissions) can inject arbitrary JavaScript code into the Configure → General → Content → Custom Scripts field. The application does not properly sanitize or encode this input before rendering it.
As a result, the injected script is stored and executed automatically in the browser of any user visiting the affected pages.
According to the proof-of-concept, a low-privileged admin user was able to inject the payload:
alert("XSS by haiiii")
After saving the configuration, the payload was executed across all pages, affecting any user accessing the application. |
|---|
| Fuente | ⚠️ https://drive.google.com/drive/folders/10p6SYcSVyfaaTg_dgItzMJvqixcmKnHR?usp=sharing |
|---|
| Usuario | hai271120 (UID 96497) |
|---|
| Sumisión | 2026-04-01 16:01 (hace 23 días) |
|---|
| Moderación | 2026-04-21 14:04 (20 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 358436 [Bagisto hasta 2.3.15 Custom Scripts secuencias de comandos en sitios cruzados] |
|---|
| Puntos | 20 |
|---|