제출 #682370: eXtplorer eXtplorer (PHP file manager) 2.1.15 Cross-Site Scripting (Stored)정보

제목eXtplorer eXtplorer (PHP file manager) 2.1.15 Cross-Site Scripting (Stored)
설명eXtplorer 2.1.15 is vulnerable to stored cross-site scripting via a crafted filename. The list view HTML-escapes names, but multiple action flows render the filename without proper encoding. Interacting with a malicious file—Move/Copy, double-click rename (in-place), Edit, or Delete—executes attacker-controlled JS in the victim’s browser. The payload persists on disk and affects any user who can access the shared directory, enabling cross-user action hijacking and, in some deployments, creation/modification of web-served files (potential path to web shell).
원천⚠️ https://github.com/soerennb/extplorer/issues/33
사용자
 NomanProdhan (UID 92021)
제출2025. 10. 25. PM 04:11 (6 개월 ago)
모더레이션2025. 11. 12. PM 01:40 (18 days later)
상태수락
VulDB 항목332185 [soerennb eXtplorer 까지 2.1.15 Filename 크로스 사이트 스크립팅]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!