| 标题 | QDOCS Smart School : School Management System 7.2 Cross Site Scripting |
|---|
| 描述 | A stored cross-site scripting (XSS) vulnerability exists in Smart School: School Management System within the Front Office → Admission Enquiry → Follow-up Admission Enquiry module, accessible via the /admin/enquiry endpoint. The application fails to properly sanitize or encode user-supplied input in the “Note” field. An authenticated low-privileged user (e.g., Receptionist) can inject malicious JavaScript that is stored in the database and executed when the affected record is viewed by higher-privileged users such as Admin or Superadmin. This may result in client-side code execution within the victim’s browser session, potentially leading to information disclosure and unauthorized actions performed with the victim’s privileges. |
|---|
| 来源 | ⚠️ https://github.com/smitp1553/School_management_System/tree/main |
|---|
| 用户 | Casmit2004 (UID 96320) |
|---|
| 提交 | 2026-03-10 17時37分 (21 日前) |
|---|
| 管理 | 2026-03-27 14時48分 (17 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 353878 [QDOCS Smart School Management System 直到 7.2 Admission Enquiry /admin/enquiry Note 跨网站脚本] |
|---|
| 积分 | 20 |
|---|