phpMyFAQ Stored Cross-site Scripting at FAQ News Content
Moderate severity
GitHub Reviewed
Published
Mar 25, 2024
in
thorsten/phpMyFAQ
•
Updated Mar 25, 2024
Description
Published by the National Vulnerability Database
Mar 25, 2024
Published to the GitHub Advisory Database
Mar 25, 2024
Reviewed
Mar 25, 2024
Last updated
Mar 25, 2024
Summary
By manipulating the news parameter in a POST request, an attacker can inject malicious JavaScript code. Upon browsing to the compromised news page, the XSS payload triggers.
PoC
news
parameter in the POST body with the following payload:%3cscript%3ealert('xssContent')%3c%2fscript%3e
Impact
This allows an attacker to execute arbitrary client side JavaScript within the context of another user's phpMyFAQ session
References