Submeter #776300: QDOCS Smart School : School Management System 7.2 Cross Site Scriptinginformação

TítuloQDOCS Smart School : School Management System 7.2 Cross Site Scripting
DescriçãoA stored cross-site scripting (XSS) vulnerability exists in Smart School: School Management System within the Front Office → Admission Enquiry → Follow-up Admission Enquiry module, accessible via the /admin/enquiry endpoint. The application fails to properly sanitize or encode user-supplied input in the “Note” field. An authenticated low-privileged user (e.g., Receptionist) can inject malicious JavaScript that is stored in the database and executed when the affected record is viewed by higher-privileged users such as Admin or Superadmin. This may result in client-side code execution within the victim’s browser session, potentially leading to information disclosure and unauthorized actions performed with the victim’s privileges.
Fonte⚠️ https://github.com/smitp1553/School_management_System/tree/main
Utilizador
 Casmit2004 (UID 96320)
Submissão10/03/2026 17h37 (há 23 dias)
Moderação27/03/2026 14h48 (17 days later)
EstadoAceite
Entrada VulDB353878 [QDOCS Smart School Management System até 7.2 Admission Enquiry /admin/enquiry Note Script de Site Cruzado]
Pontos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!