# N/A
## 概述
Cyber Cafe Management System v1.0 存在存储型跨站脚本(XSS)漏洞。
## 影响版本
Cyber Cafe Management System v1.0
## 细节
攻击者在经过身份验证后,可通过 `add-users.php` 接口向 `username` 参数注入恶意 JavaScript 代码。该恶意载荷被服务器存储,并在受害者访问受影响页面时在浏览器中执行。
## 影响
攻击者可利用该漏洞在受害者浏览器上下文中执行任意脚本,可能导致会话劫持、敏感信息泄露或恶意操作。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Cyber Cafe Management System Using PHP & MySQL , Cyber Cafe Management System Project -- 🔗来源链接
标签:
标题: Cyber-Cafe-Management-System-CVEs/CVE-2025-70890 at main · efekaanakkar/Cyber-Cafe-Management-System-CVEs · GitHub -- 🔗来源链接
标签:
神龙速读:
## 关键漏洞信息
### Description
- **CVE ID**: CVE-2025-70890
- **Vulnerability Type**: Stored Cross-Site Scripting (XSS)
- **Description**: An authenticated attacker can exploit this vulnerability by submitting crafted input containing malicious JavaScript code via the `add-users.php` endpoint during the user creation process. The application fails to properly sanitize user-supplied input, allowing persistent storage and execution of malicious JavaScript code in the victim's browser.
### Affected Product
- **Product**: Cyber Cafe Management System
- **Vendor**: PHPGurukul
- **Version**: v1.0
### Affected Component
- **File**: add-users.php
- **Parameter**: username
- **Request Method**: POST
### Attack Vector
- An authenticated attacker can exploit this vulnerability by submitting crafted input containing malicious JavaScript code via the `add-users.php` endpoint during the user creation process.
### Impact
- Execution of arbitrary JavaScript code
- Information disclosure
- Potential session hijacking
- Unauthorized actions performed in the context of authenticated users
### Proof of Concept
- The issue was validated by injecting a JavaScript payload into the `username` parameter during user creation. When the list of users is accessed through the `view-allusers.php` endpoint, the stored payload is rendered and executed automatically in the victim's browser.
### Mitigation
- Validate and sanitize all user-supplied input on the server side
- Apply proper output encoding when rendering dynamic content
- Implement a strict Content Security Policy (CSP)
- Use secure input handling mechanisms and frameworks
### Discoverer
- Efe Kaan AKKAR
暂无评论