Soumettre #752602: Code-Projects ONLINE MUSIC SITE V1.0 Storage XSS vulnerabilityinformation

TitreCode-Projects ONLINE MUSIC SITE V1.0 Storage XSS vulnerability
DescriptionA Storage XSS vulnerability was found in the "AdminAddAlbum.php" file of the "ONLINE MUSIC SITE" project. Root Cause Because AdminAddAlbum.php does not escape, clean or parameterize the POST request data submitted, when the attacker submits a malicious Payload in the txtalbum, txtsinger, txtwriter field (for example,"&lt;img src=x onerror=alert(1)&gt;"), the code does not block it and permanently stores it in the "tblalbum" table of the database. When “AdminAddAlbum.php” reads the malicious txtalbum, txtsinger, txtwriter data in the database, and original data to an HTML page as-is, the browser will <script>treat the HTML tag and execute its content. Immediate corrective actions are essential to safeguard system security and uphold data integrity.
La source⚠️ https://github.com/yuji0903/silver-guide/issues/9
Utilisateur yu_ji (UID 94509)
Soumission05/02/2026 04:34 (il y a 3 mois)
Modérer08/02/2026 09:17 (3 days later)
StatutAccepté
Entrée VulDB344930 [code-projects for Plugin 1.0 AdminAddAlbum.php txtalbum cross site scripting]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!