| Titre | Code-Projects ONLINE MUSIC SITE V1.0 Storage XSS vulnerability |
|---|
| Description | A Storage XSS vulnerability was found in the "AdminAddAlbum.php" file of the "ONLINE MUSIC SITE" project. Root Cause Because AdminAddAlbum.php does not escape, clean or parameterize the POST request data submitted, when the attacker submits a malicious Payload in the txtalbum, txtsinger, txtwriter field (for example,"<img src=x onerror=alert(1)>"), the code does not block it and permanently stores it in the "tblalbum" table of the database. When “AdminAddAlbum.php” reads the malicious txtalbum, txtsinger, txtwriter data in the database, and original data to an HTML page as-is, the browser will <script>treat the HTML tag and execute its content. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
|
|---|
| La source | ⚠️ https://github.com/yuji0903/silver-guide/issues/9 |
|---|
| Utilisateur | yu_ji (UID 94509) |
|---|
| Soumission | 05/02/2026 04:34 (il y a 3 mois) |
|---|
| Modérer | 08/02/2026 09:17 (3 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 344930 [code-projects for Plugin 1.0 AdminAddAlbum.php txtalbum cross site scripting] |
|---|
| Points | 20 |
|---|