| Título | atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS |
|---|
| Descrição | A normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings).
then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS,
due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts. |
|---|
| Fonte | ⚠️ https://github.com/atjiu/pybbs/issues/209 |
|---|
| Utilizador | ZAST.AI (UID 87884) |
|---|
| Submissão | 25/07/2025 09h56 (há 9 meses) |
|---|
| Moderação | 09/08/2025 14h35 (15 days later) |
|---|
| Estado | Aceite |
|---|
| Entrada VulDB | 319341 [atjiu pybbs até 6.0.0 Admin Panel /api/settings Script de Site Cruzado] |
|---|
| Pontos | 20 |
|---|