| Title | code-projects simple flight booking system published February 14, 2026 Cross Site Scripting |
|---|
| Description | Summary
The vulnerability exists in the History display component (showhistory.php) due to improper output encoding. Database fields are rendered directly into HTML without sanitization, leading to a Stored Cross-Site Scripting (XSS) vulnerability.
Root Cause
showhistory.php prints database values directly using:
echo "<td>" . $row['company']." ".$row['type']. "</td>";
echo "<td>" . $row['departure'] . "</td>";
echo "<td>" . $row['arrival'] . "</td>";
No htmlspecialchars() or output encoding is applied.
If a stored field contains malicious HTML/JavaScript, it executes when /showhistory.php is loaded.
Reproduction
Inject payload into a flight field (example using departure):
GET /Adminupdate.php?flightno=AA100&departure=%3Cimg%20src%3Dx%20onerror%3Dalert(1)%3E
Book and pay for flight AA100.
Visit:
GET /showhistory.php
The JavaScript executes automatically.
Impact
Attackers can execute arbitrary JavaScript in the victim’s browser session, enabling session hijacking, phishing, and unauthorized actions. |
|---|
| Source | ⚠️ https://github.com/shenxianyuguitian/simple-flight-booking-XSS |
|---|
| User | xuanyuesanshi (UID 88126) |
|---|
| Submission | 02/26/2026 11:30 (2 months ago) |
|---|
| Moderation | 03/07/2026 21:44 (9 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 349741 [code-projects Simple Flight Ticket Booking System 1.0 showhistory.php cross site scripting] |
|---|
| Points | 20 |
|---|