提交 #776300: QDOCS Smart School : School Management System 7.2 Cross Site Scripting信息

标题QDOCS Smart School : School Management System 7.2 Cross Site Scripting
描述A stored cross-site scripting (XSS) vulnerability exists in Smart School: School Management System within the Front Office → Admission Enquiry → Follow-up Admission Enquiry module, accessible via the /admin/enquiry endpoint. The application fails to properly sanitize or encode user-supplied input in the “Note” field. An authenticated low-privileged user (e.g., Receptionist) can inject malicious JavaScript that is stored in the database and executed when the affected record is viewed by higher-privileged users such as Admin or Superadmin. This may result in client-side code execution within the victim’s browser session, potentially leading to information disclosure and unauthorized actions performed with the victim’s privileges.
来源⚠️ https://github.com/smitp1553/School_management_System/tree/main
用户
 Casmit2004 (UID 96320)
提交2026-03-10 17時37分 (21 日前)
管理2026-03-27 14時48分 (17 days later)
状态已接受
VulDB条目353878 [QDOCS Smart School Management System 直到 7.2 Admission Enquiry /admin/enquiry Note 跨网站脚本]
积分20

Do you know our Splunk app?

Download it now for free!