| Title | bagisto v2.3.15 Cross Site Scripting |
|---|
| Description | The Bagisto application is vulnerable to Stored Cross-Site Scripting (Stored XSS) via the Custom Scripts configuration feature.
An authenticated low-privileged administrative user (e.g., a custom role with limited permissions) can inject arbitrary JavaScript code into the Configure → General → Content → Custom Scripts field. The application does not properly sanitize or encode this input before rendering it.
As a result, the injected script is stored and executed automatically in the browser of any user visiting the affected pages.
According to the proof-of-concept, a low-privileged admin user was able to inject the payload:
alert("XSS by haiiii")
After saving the configuration, the payload was executed across all pages, affecting any user accessing the application. |
|---|
| Source | ⚠️ https://drive.google.com/drive/folders/10p6SYcSVyfaaTg_dgItzMJvqixcmKnHR?usp=sharing |
|---|
| User | hai271120 (UID 96497) |
|---|
| Submission | 04/01/2026 16:01 (21 days ago) |
|---|
| Moderation | 04/21/2026 14:04 (20 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 358436 [Bagisto up to 2.3.15 Custom Scripts cross site scripting] |
|---|
| Points | 20 |
|---|