| Title | Xiaopi Web Application Firewall V1.0.0 Bypass |
|---|
| Description | The vulnerability exists in the official WAF firewall of Xiaopi Panel, where inadequate filtering of user input by WAF rules allows attackers to execute malicious code through carefully crafted injection statements. Although WAF protection is in place, attackers can still bypass restrictions using specific formats and encoding techniques to achieve injection attacks. |
|---|
| Source | ⚠️ https://github.com/ltranquility/vuln_submit/issues/1 |
|---|
| User | Customer (UID 83474) |
|---|
| Submission | 03/16/2026 14:19 (21 days ago) |
|---|
| Moderation | 04/01/2026 15:58 (16 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 354666 [Xiaopi Panel 1.0.0 WAF Firewall /demo.php param cross site scripting] |
|---|
| Points | 18 |
|---|