A cross-site scripting (XSS) vulnerability in /public/admin/index.php?add_user at Ecommerce-Website v1.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username text field.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/D4rkP0w4r/Full-Ecommece-Website-Add_User-Stored-XSS-POC | third party advisory exploit |
https://drive.google.com/file/d/1pXCq3E-OlczLs5Obh_qkJlJ-7kPkluEK/view?usp=sharing | third party advisory exploit |
https://hackmd.io/MUKHOiNkT2u9vi2u9CtrYA | third party advisory exploit |