| Title | QDOCS Smart School : School Management System 7.2 Cross Site Scripting |
|---|
| Description | A stored cross-site scripting (XSS) vulnerability exists in Smart School: School Management System within the Front Office → Admission Enquiry → Follow-up Admission Enquiry module, accessible via the /admin/enquiry endpoint. The application fails to properly sanitize or encode user-supplied input in the “Note” field. An authenticated low-privileged user (e.g., Receptionist) can inject malicious JavaScript that is stored in the database and executed when the affected record is viewed by higher-privileged users such as Admin or Superadmin. This may result in client-side code execution within the victim’s browser session, potentially leading to information disclosure and unauthorized actions performed with the victim’s privileges. |
|---|
| Source | ⚠️ https://github.com/smitp1553/School_management_System/tree/main |
|---|
| User | Casmit2004 (UID 96320) |
|---|
| Submission | 03/10/2026 17:37 (21 days ago) |
|---|
| Moderation | 03/27/2026 14:48 (17 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 353878 [QDOCS Smart School Management System up to 7.2 Admission Enquiry /admin/enquiry Note cross site scripting] |
|---|
| Points | 20 |
|---|