| Titre | SapneshNaik Student-Management-System V1.0 Reflected XSS |
|---|
| Description | The XSS vulnerability exists in the project’s `index.php` and `admin.php` files (root directory of the project). Both pages have the same backend processing logic for the `error` GET parameter, leading to the same XSS vulnerability.
The XSS vulnerability is caused by improper handling of the user-controlled `error` GET parameter in both `index.php` and `admin.php` files. The backend code directly outputs the value of the`error` parameter to the HTML page without any input validation, sanitization, or encoding (e.g., using the `htmlspecialchars()` function). This allows attackers to construct malicious XSS payloads, which are executed when the page is rendered in the user’s browser. |
|---|
| La source | ⚠️ https://github.com/duckpigdog/CVE/blob/main/XSS%E2%80%94%E2%80%94SapneshNaik_Student-Management-System.md |
|---|
| Utilisateur | suc2es2 (UID 90074) |
|---|
| Soumission | 07/02/2026 19:40 (il y a 3 mois) |
|---|
| Modérer | 21/02/2026 18:28 (14 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 347313 [SapneshNaik Student Management System index.php Erreur cross site scripting] |
|---|
| Points | 20 |
|---|