| Titre | elecV2P <=3.8.3 Reflected XSS |
|---|
| Description | The /logs endpoint reflects the filename parameter directly into HTML output via res.write(... ${log} ...) without escaping. An attacker can inject arbitrary HTML/JavaScript through the filename value, executing in any visitor's browser. No authentication required.
|
|---|
| La source | ⚠️ https://github.com/elecV2/elecV2P/issues/201 |
|---|
| Utilisateur | ZAST.AI (UID 87884) |
|---|
| Soumission | 13/03/2026 05:30 (il y a 24 jours) |
|---|
| Modérer | 27/03/2026 15:12 (14 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 353900 [elecV2 elecV2P jusqu’à 3.8.3 Endpoint /logs filename cross site scripting] |
|---|
| Points | 18 |
|---|