| Título | code-projects School Fees Payment System 1.0 Cross Site Scripting |
|---|
| Descrição | During the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'sname', 'contact', 'about', 'emailid', 'transcation_remark' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity. |
|---|
| Fonte | ⚠️ https://github.com/tuooo/CVE/issues/18 |
|---|
| Utilizador | DS_Leo (UID 86084) |
|---|
| Submissão | 20/06/2025 18h00 (há 10 meses) |
|---|
| Moderação | 24/06/2025 10h11 (4 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 313741 [code-projects School Fees Payment System 1.0 /student.php sname/contact/about/emailid/transcation_remark Script de Site Cruzado] |
|---|
| Pontos | 20 |
|---|