제출 #779180: elecV2P <=3.8.3 Reflected XSS정보

제목elecV2P <=3.8.3 Reflected XSS
설명The /logs endpoint reflects the filename parameter directly into HTML output via res.write(... ${log} ...) without escaping. An attacker can inject arbitrary HTML/JavaScript through the filename value, executing in any visitor's browser. No authentication required.
원천⚠️ https://github.com/elecV2/elecV2P/issues/201
사용자
 ZAST.AI (UID 87884)
제출2026. 03. 13. AM 05:30 (17 날 ago)
모더레이션2026. 03. 27. PM 03:12 (14 days later)
상태수락
VulDB 항목353900 [elecV2 elecV2P 까지 3.8.3 Endpoint /logs filename 크로스 사이트 스크립팅]
포인트들18

Want to know what is going to be exploited?

We predict KEV entries!