提交 #800837: EMPLOYEE_MANAGEMENT_SYSTEM v1.0 Stored XSS信息

标题EMPLOYEE_MANAGEMENT_SYSTEM v1.0 Stored XSS
描述## EMPLOYEE_MANAGEMENT_SYSTEM file `370project/mark.php` contains a Stored XSS vulnerability Impact of the vulnerability An attacker can inject JavaScript into a project record by submitting a crafted value in the “Assign Mark” form. When an administrator later opens the same project marking page, the injected script is rendered into an HTML attribute context and may execute, which can lead to: - Session hijacking (stealing cookies/tokens) - Account takeover (performing actions as the admin) - Phishing/UI manipulation (modifying page content to deceive users) ### Payload: "><sCrIpT>alert(1)</ScRiPt> ### Sources download: https://code-projects.org/employee-management-system-in-php-with-source-code/
来源⚠️ https://github.com/zzzxc643/CVE1/blob/main/EMPLOYEE_MANAGEMENT_SYSTEM/vul7.md
用户
 SSL_Seven_Security_Lab_WangZhiQiang_ZhanXiuChen (UID 97200)
提交2026-04-09 08時53分 (19 日前)
管理2026-04-26 18時01分 (17 days later)
状态重复
VulDB条目359716 [code-projects Employee Management System 1.0 370project/mark.php 跨网站脚本]
积分0

Do you need the next level of professionalism?

Upgrade your account now!