Home

Description

FaceSentry Access Control System 6.4.8 contains a cross-site scripting vulnerability in the 'msg' parameter of pluginInstall.php that allows attackers to inject malicious scripts. Attackers can exploit the unvalidated input to execute arbitrary JavaScript in victim browsers, potentially stealing authentication credentials and conducting phishing attacks.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-07 | Updated 2026-01-08 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

6.4.8
affected

5.7.2
affected

5.7.0
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.php exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.php (Zero Science Lab Vulnerability Advisory) third-party-advisory

packetstormsecurity.com/files/153494 (Packet Storm Security Exploit Entry) exploit

cxsecurity.com/issue/WLB-2019070017 (CXSecurity Vulnerability Listing) third-party-advisory

exchange.xforce.ibmcloud.com/vulnerabilities/163191 (IBM X-Force Vulnerability Exchange) vdb-entry

cve.org (CVE-2019-25277)

nvd.nist.gov (CVE-2019-25277)

Download JSON