| Title | code-projects Exam Form Submission V1.0 cross site scripting |
|---|
| Description | During the security review of "Exam Form Submission", I discovered a critical XSS vulnerability in the "/admin/update_fst.php" file. This vulnerability stems from insufficient user input validation and output encoding of the 'sname' parameter, allowing attackers to inject malicious script code. Therefore, attackers can execute arbitrary scripts in the victim's browser, steal sensitive information, and perform operations on behalf of the victim. Immediate remedial measures are needed to ensure system security and protect user data. |
|---|
| Source | ⚠️ https://github.com/sxc2044-pixel/hajimi/issues/1 |
|---|
| User | hajimi (UID 96437) |
|---|
| Submission | 03/14/2026 05:25 (17 days ago) |
|---|
| Moderation | 03/29/2026 19:52 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 354131 [code-projects Exam Form Submission 1.0 /admin/update_fst.php sname cross site scripting] |
|---|
| Points | 20 |
|---|