Title of the Vulnerability: Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko

Product Name: image_gallery 

Product Type: Image Gallery Management System 

Finder & Exploit Owner: Maloy Roy Orko

Vulnerability Class: Reflected Cross Site Scripting 

Vendor:
needyamin

Vendor Link: 
https://github.com/needyamin/

Vulnerable Product Link: https://github.com/needyamin/image_gallery/

Affected Components:

view.php?username= 

Suggested Description:

Reflected XSS in "view.php?username=" in "image_gallery application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to execute malicious JavaScript code via XSS as no validations are provided and can get cookies of admin" via "view.php?username=".

Attack Vectors:

To exploit vulnerability,he has to input XSS exploits via view.php?username= and then he can give the links to their targets even Admin and when targets click it! Attacker can gain admin cookie and then he can login admin and as the file upload isn't protected can hijack the whole server too!He can even execute malicious JavaScript codes into visitors browser via this vulnerability.

Detailed Blog:

https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html