Home

Description

ZKTeco ZKAccess Security System 5.3.1 contains a stored cross-site scripting vulnerability that allows attackers to execute arbitrary HTML and script code by injecting malicious payloads through the 'holiday_name' and 'memo' POST parameters. Attackers can submit crafted requests with script code in these parameters to compromise user browser sessions and steal sensitive information.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

5.3.12252
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5368.php (Zero Science Lab Disclosure) third-party-advisory

cxsecurity.com/issue/WLB-2016090004 (CXSecurity) third-party-advisory

exchange.xforce.ibmcloud.com/vulnerabilities/116479 (IBM X-Force Exchange) vdb-entry

packetstormsecurity.com/files/138572 (Packet Storm Security) exploit

www.exploit-db.com/exploits/40328/ (Reference) exploit

www.vulncheck.com/...eco-zkaccess-security-system-stored-xss (VulnCheck Advisory: ZKTeco ZKAccess Security System 5.3.1 Stored XSS) third-party-advisory

cve.org (CVE-2016-20032)

nvd.nist.gov (CVE-2016-20032)

Download JSON