提交 #779180: elecV2P <=3.8.3 Reflected XSS信息

标题elecV2P <=3.8.3 Reflected XSS
描述The /logs endpoint reflects the filename parameter directly into HTML output via res.write(... ${log} ...) without escaping. An attacker can inject arbitrary HTML/JavaScript through the filename value, executing in any visitor's browser. No authentication required.
来源⚠️ https://github.com/elecV2/elecV2P/issues/201
用户
 ZAST.AI (UID 87884)
提交2026-03-13 05時30分 (21 日前)
管理2026-03-27 15時12分 (14 days later)
状态已接受
VulDB条目353900 [elecV2 elecV2P 直到 3.8.3 Endpoint /logs filename 跨网站脚本]
积分18

Interested in the pricing of exploits?

See the underground prices here!