Submit #786325: code-projects Online Hotel Booking IN PHP 1.0 Cross Site Scriptinginfo

Titlecode-projects Online Hotel Booking IN PHP 1.0 Cross Site Scripting
DescriptionA Reflected Cross-Site Scripting (XSS) vulnerability exists in the Online Hotel Booking System in PHP within the booking functionality. The vulnerability occurs in the following endpoint: /hotel booking/booknow.php The application processes user-controlled input through the roomname parameter supplied via the HTTP GET request. The value of this parameter is reflected in the application response without proper validation or output encoding. Because the application directly includes the user-supplied value in the HTML output, malicious HTML or JavaScript code can be injected and executed in the browser of users who access a specially crafted URL. During testing, it was observed that injecting JavaScript code into the roomname parameter results in script execution when the page is rendered. injected value: Duplexerwat<script>alert(1)</script>d494k This indicates that the application fails to properly sanitize or encode user input before rendering it in the browser.
Source⚠️ https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20Online%20Hotel%20Booking%20System%20roomname%20Parameter.md
User
 AhmadMarzouk (UID 95993)
Submission03/23/2026 19:12 (16 days ago)
Moderation04/06/2026 16:17 (14 days later)
StatusAccepted
VulDB entry355521 [code-projects Online Hotel Booking 1.0 Booking Endpoint /booknow.php roomname cross site scripting]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!