xzs v3.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /admin/question/edit. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title text field.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/mindskip/xzs | third party advisory |
https://sudsy-fish-73d.notion.site/XSS-about-xzs-system-31f689f2f3014ba99f12423fae521e49 | third party advisory exploit |
https://www.mindskip.net/xzs.html%3B | |
https://github.com/mindskip/xzs.aa | broken link |