提交 #754035: SapneshNaik Student-Management-System V1.0 Reflected XSS信息

标题SapneshNaik Student-Management-System V1.0 Reflected XSS
描述The XSS vulnerability exists in the project’s `index.php` and `admin.php` files (root directory of the project). Both pages have the same backend processing logic for the `error` GET parameter, leading to the same XSS vulnerability. The XSS vulnerability is caused by improper handling of the user-controlled `error` GET parameter in both `index.php` and `admin.php` files. The backend code directly outputs the value of the`error` parameter to the HTML page without any input validation, sanitization, or encoding (e.g., using the `htmlspecialchars()` function). This allows attackers to construct malicious XSS payloads, which are executed when the page is rendered in the user’s browser.
来源⚠️ https://github.com/duckpigdog/CVE/blob/main/XSS%E2%80%94%E2%80%94SapneshNaik_Student-Management-System.md
用户
 suc2es2 (UID 90074)
提交2026-02-07 19時40分 (3 月前)
管理2026-02-21 18時28分 (14 days later)
状态已接受
VulDB条目347313 [SapneshNaik Student Management System 直到 f4b4f0928f0b5551a28ee81ae7e7fe47d9345318 index.php 错误 跨网站脚本]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!