Description
JLex GuestBook 1.6.4 contains a reflected cross-site scripting vulnerability in the 'q' URL parameter that allows attackers to inject malicious scripts. Attackers can craft malicious links with XSS payloads to steal session tokens or execute arbitrary JavaScript in victims' browsers.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Credits
CraCkEr
References
www.exploit-db.com/exploits/51647 (ExploitDB-51647)
jlexart.com/ (JLexArt Vendor Webpage)
www.vulncheck.com/...-cross-site-scripting-via-url-parameter (VulnCheck Advisory: JLex GuestBook 1.6.4 Reflected Cross-Site Scripting via URL Parameter)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.