Soumettre #754035: SapneshNaik Student-Management-System V1.0 Reflected XSSinformation

TitreSapneshNaik Student-Management-System V1.0 Reflected XSS
DescriptionThe XSS vulnerability exists in the project’s `index.php` and `admin.php` files (root directory of the project). Both pages have the same backend processing logic for the `error` GET parameter, leading to the same XSS vulnerability. The XSS vulnerability is caused by improper handling of the user-controlled `error` GET parameter in both `index.php` and `admin.php` files. The backend code directly outputs the value of the`error` parameter to the HTML page without any input validation, sanitization, or encoding (e.g., using the `htmlspecialchars()` function). This allows attackers to construct malicious XSS payloads, which are executed when the page is rendered in the user’s browser.
La source⚠️ https://github.com/duckpigdog/CVE/blob/main/XSS%E2%80%94%E2%80%94SapneshNaik_Student-Management-System.md
Utilisateur
 suc2es2 (UID 90074)
Soumission07/02/2026 19:40 (il y a 3 mois)
Modérer21/02/2026 18:28 (14 days later)
StatutAccepté
Entrée VulDB347313 [SapneshNaik Student Management System index.php Erreur cross site scripting]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!