| Title | code-projects School Fees Payment System 1.0 Cross Site Scripting |
|---|
| Description | During the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/branch.php" file. This vulnerability stems from insufficient user input validation of the 'Branch', 'Address', 'Detail' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity. |
|---|
| Source | ⚠️ https://github.com/tuooo/CVE/issues/14 |
|---|
| User | DS_Leo (UID 86084) |
|---|
| Submission | 06/14/2025 11:33 (10 months ago) |
|---|
| Moderation | 06/19/2025 12:34 (5 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 313335 [code-projects School Fees Payment System 1.0 /branch.php Branch/Address/Detail cross site scripting] |
|---|
| Points | 20 |
|---|