First published: Tue Sep 29 2020(Updated: )
Projectworlds Visitor Management System in PHP 1.0 allows XSS. The file myform.php does not perform input validation on the request parameters. An attacker can inject javascript payloads in the parameters to perform various attacks such as stealing of cookies,sensitive information etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Projectworlds Visitor Management System in PHP | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25761 is a vulnerability in Projectworlds Visitor Management System in PHP 1.0 that allows cross-site scripting (XSS) attacks.
CVE-2020-25761 occurs because the file myform.php in Projectworlds Visitor Management System in PHP 1.0 does not perform input validation on the request parameters, allowing an attacker to inject JavaScript payloads.
With CVE-2020-25761, an attacker can inject JavaScript payloads in the parameters to perform various attacks, such as stealing cookies and sensitive information.
CVE-2020-25761 has a severity rating of medium with a CVSS score of 6.1.
To fix CVE-2020-25761, make sure to perform input validation on the request parameters in the myform.php file of Projectworlds Visitor Management System in PHP 1.0.