First published: Mon Jun 27 2022(Updated: )
A vulnerability was found in SourceCodester Library Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/edit_admin_details.php?id=admin. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Library Management System | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2213 has been categorized as a significant vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2022-2213, implement input validation and output encoding on the 'Name' parameter in the /admin/edit_admin_details.php file.
CVE-2022-2213 can lead to cross-site scripting (XSS) attacks, allowing attackers to execute malicious scripts in the context of the user's browser.
CVE-2022-2213 affects version 1.0 of the SourceCodester Library Management System.
As of the last report, there have been indications that CVE-2022-2213 is being targeted by attackers, emphasizing the need for immediate remediation.