关联漏洞
介绍
CVE-2025-46178
------------------------------------------
Cross-Site Scripting (XSS) vulnerability exists in askquery.php via the
eid parameter in the CloudClassroom PHP Project. This allows remote
attackers to inject arbitrary JavaScript in the context of a victim s
browser session by sending a crafted URL, leading to session hijacking
or defacement.
------------------------------------------
Additional Information
The payload demonstrates successful JavaScript execution using the alert(9734) function.
Input is not being properly sanitized or encoded before rendering, exposing the application to reflected XSS.
To mitigate this issue:
------------------------------------------
Use server-side input validation
Encode output properly (especially for HTML contexts)
Consider using security libraries like OWASP ESAPI or frameworks with built-in XSS protection
Vulnerability Type
------------------------------------------
Cross Site Scripting (XSS)
Vendor of Product
------------------------------------------
https://github.com/mathurvishal/CloudClassroom-PHP-Project
Affected Product Code Base
------------------------------------------
https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0 - https://github.com/mathurvishal/CloudClassroom-PHP-Project 1.0
Affected Component
------------------------------------------
askquery.php, eid GET parameter, frontend HTML rendering logic
Attack Vectors
------------------------------------------
An attacker can inject malicious JavaScript payloads via the eid GET parameter.
When a victim visits a crafted URL, the script executes in their browser, potentially stealing cookies or performing unauthorized actions.
1. click on http://localhost/CloudClassroom-PHP-Project-master/askquery.php?eid=testing%40example.com%27%22()%26%25%3Czzz%3E%3CScRiPt%20%3Ealert(9734)%3C/ScRiPt%3E
2. you will see alert
Reference
https://owasp.org/www-community/attacks/xss/
------------------------------------------
Discoverer : saurabh
------------------------------------------
linkdin : https://www.linkedin.com/in/saurabh-b294b21aa/
------------------------------------------
文件快照
[4.0K] /data/pocs/6e7bf6b66de50145b2231db1debc7092a04b728f
├── [1.8K] Cross-Site Scripting (XSS) in CloudClassroom PHP Project
└── [2.1K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。