Soumettre #779180: elecV2P <=3.8.3 Reflected XSSinformation

TitreelecV2P <=3.8.3 Reflected XSS
DescriptionThe /logs endpoint reflects the filename parameter directly into HTML output via res.write(... ${log} ...) without escaping. An attacker can inject arbitrary HTML/JavaScript through the filename value, executing in any visitor's browser. No authentication required.
La source⚠️ https://github.com/elecV2/elecV2P/issues/201
Utilisateur
 ZAST.AI (UID 87884)
Soumission13/03/2026 05:30 (il y a 24 jours)
Modérer27/03/2026 15:12 (14 days later)
StatutAccepté
Entrée VulDB353900 [elecV2 elecV2P jusqu’à 3.8.3 Endpoint /logs filename cross site scripting]
Points18

Interested in the pricing of exploits?

See the underground prices here!