提交 #800726: https://code-projects.org EMPLOYEE_MANAGEMENT_SYSTEM file `370project/edit.php` has a Reflected XSS vulnerability v1.0 Reflected XSS信息

标题https://code-projects.org EMPLOYEE_MANAGEMENT_SYSTEM file `370project/edit.php` has a Reflected XSS vulnerability v1.0 Reflected XSS
描述## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/edit.php` has a Reflected XSS vulnerability Impact of the vulnerability An attacker can craft a malicious link to trick an administrator into clicking it, causing arbitrary JavaScript to execute in the administrator’s browser. This may lead to: - Session hijacking (stealing cookies/tokens) - Account takeover (performing sensitive actions with admin privileges) - Page defacement / phishing (fake login prompts, tampering with displayed data) #### Payload: "><ScRiPt>alert(1)</ScRiPt> ``` #### sources download: https://code-projects.org/employee-management-system-in-php-with-source-code/ ``` https://code-projects.org/employee-management-system-in-php-with-source-code/ ```
来源⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul2.md
用户
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
提交2026-04-09 05時48分 (18 日前)
管理2026-04-26 10時54分 (17 days later)
状态已接受
VulDB条目359670 [code-projects Employee Management System 1.0 370project/edit.php 标识符 跨网站脚本]
积分20

Interested in the pricing of exploits?

See the underground prices here!