Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko

2025.02.24
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79

Title of the Vulnerability: Image_Gallery | view.php?username= | Cross Site Scripting (Reflected XSS) | Found By Maloy Roy Orko Product Name: image_gallery Product Type: Image Gallery Management System Finder & Exploit Owner: Maloy Roy Orko Vulnerability Class: Reflected Cross Site Scripting Vendor: needyamin Vendor Link: https://github.com/needyamin/ Vulnerable Product Link: https://github.com/needyamin/image_gallery/ Affected Components: view.php?username= Suggested Description: Reflected XSS in "view.php?username=" in "image_gallery application By needyamin v 1.0" Found By "Maloy Roy Orko" allows "remote" attacker "to execute malicious JavaScript code via XSS as no validations are provided and can get cookies of admin" via "view.php?username=". Attack Vectors: To exploit vulnerability,he has to input XSS exploits via view.php?username= and then he can give the links to their targets even Admin and when targets click it! Attacker can gain admin cookie and then he can login admin and as the file upload isn't protected can hijack the whole server too!He can even execute malicious JavaScript codes into visitors browser via this vulnerability. Detailed Blog: https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html


Vote for this issue:
50%
50%

Comment it here.

Copyright 2025, cxsecurity.com

 

Back to Top