Submit #754035: SapneshNaik Student-Management-System V1.0 Reflected XSSinfo

TitleSapneshNaik Student-Management-System V1.0 Reflected XSS
DescriptionThe XSS vulnerability exists in the project’s `index.php` and `admin.php` files (root directory of the project). Both pages have the same backend processing logic for the `error` GET parameter, leading to the same XSS vulnerability. The XSS vulnerability is caused by improper handling of the user-controlled `error` GET parameter in both `index.php` and `admin.php` files. The backend code directly outputs the value of the`error` parameter to the HTML page without any input validation, sanitization, or encoding (e.g., using the `htmlspecialchars()` function). This allows attackers to construct malicious XSS payloads, which are executed when the page is rendered in the user’s browser.
Source⚠️ https://github.com/duckpigdog/CVE/blob/main/XSS%E2%80%94%E2%80%94SapneshNaik_Student-Management-System.md
User
 suc2es2 (UID 90074)
Submission02/07/2026 19:40 (3 months ago)
Moderation02/21/2026 18:28 (14 days later)
StatusAccepted
VulDB entry347313 [SapneshNaik Student Management System up to f4b4f0928f0b5551a28ee81ae7e7fe47d9345318 index.php Error cross site scripting]
Points20

Do you know our Splunk app?

Download it now for free!