phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://ciprianmp.com/ | vendor advisory |
https://sourceforge.net/projects/phpmychat/ | third party advisory |
https://cinzinga.github.io/CVE-2019-19908/ | third party advisory |