| Titre | PHPGurukul Apartment Visitors Management System 1.0 Cross Site Scripting |
|---|
| Description | - A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Apartment Visitors Management System. The vulnerability exists due to improper sanitization and lack of output encoding on the adminname field submitted via a POST request to /admin-profile.php.
- This user-supplied input is saved and later rendered directly into HTML content on /admin-profile.php without any escaping or filtering. This allows attackers to inject malicious JavaScript that will execute in the browser of any user who loads the page — including administrators. |
|---|
| La source | ⚠️ https://github.com/HieuGITLAB/my-cves/issues/10 |
|---|
| Utilisateur | ppzzaarr (UID 51209) |
|---|
| Soumission | 16/07/2025 09:01 (il y a 9 mois) |
|---|
| Modérer | 19/07/2025 06:04 (3 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 316971 [PHPGurukul Apartment Visitors Management System 1.0 HTTP POST Request /admin-profile.php adminname cross site scripting] |
|---|
| Points | 20 |
|---|