| Titre | PHPGurukul Apartment Visitors Management System 1.0 Cross Site Scripting |
|---|
| Description | - A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Apartment Visitors Management System. The vulnerability exists due to improper sanitization and lack of output encoding on the visname field submitted via a POST request to /create-pass.php.
- This user-supplied input is saved and later rendered directly into HTML content on /bwdates-passreports-details.php without any escaping or filtering. This allows attackers to inject malicious JavaScript that will execute in the browser of any user who loads the page — including administrators. |
|---|
| La source | ⚠️ https://github.com/HieuGITLAB/my-cves/issues/9 |
|---|
| Utilisateur | ppzzaarr (UID 51209) |
|---|
| Soumission | 16/07/2025 08:51 (il y a 10 mois) |
|---|
| Modérer | 19/07/2025 06:04 (3 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 316970 [PHPGurukul Apartment Visitors Management System 1.0 HTTP POST Request bwdates-passreports-details.php visname cross site scripting] |
|---|
| Points | 20 |
|---|