Отправить #622331: atjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSSИнформация

Названиеatjiu https://github.com/atjiu/pybbs <=6.0.0 Stored XSS
ОписаниеA normal user can inject malicious JavaScript code into database through profile modify function (endpoint /api/settings). then the payloads will output without any encoding on the different web pages of both frontend and admin panel (endpoint /user/{username} and /admin/user/edit?id={uid}), thus trigger stored XSS, due to the cookies' httpOnly is set to false, it allows attacker to steal normal users and administrator's cookies thus take over their accounts.
Источник⚠️ https://github.com/atjiu/pybbs/issues/209
Пользователь
 ZAST.AI (UID 87884)
Представление25.07.2025 09:56 (9 месяцы назад)
Модерация09.08.2025 14:35 (15 days later)
Статуспринято
Запись VulDB319341 [atjiu pybbs до 6.0.0 Admin Panel /api/settings межсайтовый скриптинг]
Баллы20

Want to know what is going to be exploited?

We predict KEV entries!