Súbít #597093: SourceCodester My Food Recipe 1.0 Stored Cross Site Scriptingbayani

KuraSourceCodester My Food Recipe 1.0 Stored Cross Site Scripting
GaskiyaA Stored Cross-Site Scripting (XSS) vulnerability was discovered in the My Food Recipe application developed by SourceCodester. The vulnerability resides in the "Add Recipe" functionality, where user-supplied input is improperly sanitized before being stored and rendered, allowing arbitrary JavaScript to be executed in the context of other users' sessions. Affected Field: recipe_name (input type: text) Affected Endpoint: /endpoint/add-recipe.php (via #addRecipeModal modal form) Input Vector: POST request via form submission Impact: Stored JavaScript payload is triggered when the page loads or when the data is viewed. Steps to Reproduce Open the modal by clicking the Add Recipe button: <button type="button" class="btn btn-add-food btn-secondary" data-toggle="modal" data-target="#addRecipeModal">Add Recipe</button> In the Recipe Name field, insert the following payload: <script>alert('PoC VulDB My Food Recipe')</script> Fill the remaining fields with valid data (e.g., category, ingredients, procedure) and click Save changes. Upon submitting the form, the payload is stored in the database. Whenever the recipe data is rendered again (e.g., recipe listing or detail views), the JavaScript is executed, confirming a persistent (stored) XSS vulnerability.
Manga⚠️ https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README4.md
Màdùmga
 RaulPACXXX (UID 84502)
Furta06/14/2025 19:39 (8 Wurɗi 전)
Gargajiya06/19/2025 12:39 (5 days later)
HalittaShingilam
VulDB gite313340 [SourceCodester My Food Recipe 1.0 Add Recipe Page /endpoint/add-recipe.php addRecipeModal Sunu Cross Site Scripting]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!