| Titre | bagisto v2.3.15 Cross Site Scripting |
|---|
| Description | The Bagisto application is vulnerable to Stored Cross-Site Scripting (Stored XSS) via the Custom Scripts configuration feature.
An authenticated low-privileged administrative user (e.g., a custom role with limited permissions) can inject arbitrary JavaScript code into the Configure → General → Content → Custom Scripts field. The application does not properly sanitize or encode this input before rendering it.
As a result, the injected script is stored and executed automatically in the browser of any user visiting the affected pages.
According to the proof-of-concept, a low-privileged admin user was able to inject the payload:
alert("XSS by haiiii")
After saving the configuration, the payload was executed across all pages, affecting any user accessing the application. |
|---|
| La source | ⚠️ https://drive.google.com/drive/folders/10p6SYcSVyfaaTg_dgItzMJvqixcmKnHR?usp=sharing |
|---|
| Utilisateur | hai271120 (UID 96497) |
|---|
| Soumission | 01/04/2026 16:01 (il y a 24 jours) |
|---|
| Modérer | 21/04/2026 14:04 (20 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 358436 [Bagisto jusqu’à 2.3.15 Custom Scripts cross site scripting] |
|---|
| Points | 20 |
|---|