提交 #593789: PHPGurukul COVID-19 Testing Management System 2021 version Cross-Site Scripting (XSS)信息

标题PHPGurukul COVID-19 Testing Management System 2021 version Cross-Site Scripting (XSS)
描述The search-report-result.php endpoint of the COVID-19 Testing Management System is vulnerable to reflected Cross-Site Scripting (XSS). User-supplied input passed through the q parameter is improperly handled and reflected into the HTML response without appropriate sanitization. This enables an attacker to inject arbitrary JavaScript code into the victim’s browser. When a user submits a search query, the application reflects the input directly into the page, making it susceptible to XSS. An attacker can craft a malicious URL and trick a victim into clicking it, resulting in the execution of JavaScript, such as cookie theft or session hijacking. Affected Endpoint: /search-report-result.php using with this payload<img src=x onerror=alert(document.cookie)>
来源⚠️ http://localhost/covid-tms/search-report-result.php
用户
 Anzil (UID 86393)
提交2025-06-10 09時01分 (11 月前)
管理2025-06-19 09時22分 (9 days later)
状态已接受
VulDB条目313289 [PHPGurukul COVID19 Testing Management System 2021 search-report-result.php q 跨网站脚本]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!