Submeter #716583: https://github.com/rawchen/ecms?tab=readme-ov-file ecms 1.0 Stored XSSinformação

Títulohttps://github.com/rawchen/ecms?tab=readme-ov-file ecms 1.0 Stored XSS
DescriçãoThe 1.0 version of ecms/updateProductServlet interface has an XSS storage vulnerability, where attackers can pass in the product name (i.e. productName parameter) to cause the server to execute JS code, resulting in an XSS storage vulnerability. Receiving the productName parameter in the updateProductServlet class and directly updating it to the database without verifying the incoming content, there is an XSS storage vulnerability
Fonte⚠️ https://github.com/zyhzheng500-maker/cve/blob/main/%E5%AD%98%E5%82%A8%E5%9E%8BXss.md
Utilizador
 zyhsec (UID 93418)
Submissão16/12/2025 12h19 (há 4 meses)
Moderação27/12/2025 14h33 (11 days later)
EstadoAceite
Entrada VulDB338526 [rawchen ecms até b59d7feaa9094234e8aa6c8c6b290621ca575ded Add New Product Page updateProductServlet.java updateProductServlet productName Script de Site Cruzado]
Pontos20

Want to know what is going to be exploited?

We predict KEV entries!