提交 #682370: eXtplorer eXtplorer (PHP file manager) 2.1.15 Cross-Site Scripting (Stored)信息

标题eXtplorer eXtplorer (PHP file manager) 2.1.15 Cross-Site Scripting (Stored)
描述eXtplorer 2.1.15 is vulnerable to stored cross-site scripting via a crafted filename. The list view HTML-escapes names, but multiple action flows render the filename without proper encoding. Interacting with a malicious file—Move/Copy, double-click rename (in-place), Edit, or Delete—executes attacker-controlled JS in the victim’s browser. The payload persists on disk and affects any user who can access the shared directory, enabling cross-user action hijacking and, in some deployments, creation/modification of web-served files (potential path to web shell).
来源⚠️ https://github.com/soerennb/extplorer/issues/33
用户
 NomanProdhan (UID 92021)
提交2025-10-25 16時11分 (6 月前)
管理2025-11-12 13時40分 (18 days later)
状态已接受
VulDB条目332185 [soerennb eXtplorer 直到 2.1.15 Filename 跨网站脚本]
积分20

Do you know our Splunk app?

Download it now for free!