提出 #623372: yangzongzhuan RuoYi <=4.8.1 cross site scripting情報

タイトルyangzongzhuan RuoYi <=4.8.1 cross site scripting
説明A stored Cross-Site Scripting (XSS) vulnerability exists in the `/system/notice/edit` route of the affected application, specifically in the `editSave` method handling this endpoint. The application fails to properly sanitize user-supplied input before storing it into the backend database. As a result, malicious payloads submitted by attackers are persistently stored and subsequently executed in the browser context of users accessing the relevant functionality.
ソース⚠️ https://github.com/yangzongzhuan/RuoYi/issues/298
ユーザー
 ez-lbz (UID 87033)
送信2025年07月26日 10:53 (9 月 ago)
モデレーション2025年08月10日 17:59 (15 days later)
ステータス承諾済み
VulDBエントリ319381 [yangzongzhuan RuoYi 迄 4.8.1 /system/notice/edit noticeTitle/noticeContent クロスサイトスクリプティング]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!