| Title | elecV2P <=3.8.3 Reflected XSS |
|---|
| Description | The /logs endpoint reflects the filename parameter directly into HTML output via res.write(... ${log} ...) without escaping. An attacker can inject arbitrary HTML/JavaScript through the filename value, executing in any visitor's browser. No authentication required.
|
|---|
| Source | ⚠️ https://github.com/elecV2/elecV2P/issues/201 |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 03/13/2026 05:30 (16 days ago) |
|---|
| Moderation | 03/27/2026 15:12 (14 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 353900 [elecV2 elecV2P up to 3.8.3 Endpoint /logs filename cross site scripting] |
|---|
| Points | 18 |
|---|