| タイトル | yangzongzhuan RuoYi <=4.8.1 cross site scripting |
|---|
| 説明 | A stored Cross-Site Scripting (XSS) vulnerability exists in the `/system/notice/edit` route of the affected application, specifically in the `editSave` method handling this endpoint. The application fails to properly sanitize user-supplied input before storing it into the backend database. As a result, malicious payloads submitted by attackers are persistently stored and subsequently executed in the browser context of users accessing the relevant functionality. |
|---|
| ソース | ⚠️ https://github.com/yangzongzhuan/RuoYi/issues/298 |
|---|
| ユーザー | ez-lbz (UID 87033) |
|---|
| 送信 | 2025年07月26日 10:53 (9 月 ago) |
|---|
| モデレーション | 2025年08月10日 17:59 (15 days later) |
|---|
| ステータス | 承諾済み |
|---|
| VulDBエントリ | 319381 [yangzongzhuan RuoYi 迄 4.8.1 /system/notice/edit noticeTitle/noticeContent クロスサイトスクリプティング] |
|---|
| ポイント | 20 |
|---|