| Title | code-projects School Fees Payment System 1.0 Cross Site Scripting |
|---|
| Description | During the security review of "School Fees Payment System", I discovered a Stored Cross-Site Scripting vulnerability in the "/student.php" file. This vulnerability stems from insufficient user input validation of the 'sname', 'contact', 'about', 'emailid', 'transcation_remark' parameters, allowing attackers to inject malicious front-end code. Therefore, attackers can forge input values, thereby manipulating front-end code and performing the set behaviors in the user's browser, such as stealing the user's cookies. Immediate remedial measures are needed to ensure system security and protect data integrity. |
|---|
| Source | ⚠️ https://github.com/tuooo/CVE/issues/18 |
|---|
| User | DS_Leo (UID 86084) |
|---|
| Submission | 06/20/2025 18:00 (10 months ago) |
|---|
| Moderation | 06/24/2025 10:11 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 313741 [code-projects School Fees Payment System 1.0 /student.php sname/contact/about/emailid/transcation_remark cross site scripting] |
|---|
| Points | 20 |
|---|