Description
A vulnerability was found in Bdtask/CodeCanyon Wholesale Inventory Control and Inventory Management System up to 20250320. Impacted is an unknown function of the file /edit_profile. Performing manipulation of the argument first_name/last_name results in basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
In Bdtask/CodeCanyon Wholesale Inventory Control and Inventory Management System up to 20250320 wurde eine Schwachstelle gefunden. Es geht um eine nicht näher bekannte Funktion der Datei /edit_profile. Die Veränderung des Parameters first_name/last_name resultiert in basic cross site scripting. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
Problem types
Product status
Timeline
| 2025-11-14: | Advisory disclosed |
| 2025-11-14: | VulDB entry created |
| 2025-11-14: | VulDB entry last update |
Credits
4m3rr0r (VulDB User)
References
vuldb.com/?id.332470 (VDB-332470 | Bdtask/CodeCanyon Wholesale Inventory Control and Inventory Management System edit_profile cross site scripting)
vuldb.com/?ctiid.332470 (VDB-332470 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.684824 (Submit #684824 | Bdtask Wholesale Management System Latest version as of 2025-10-16 Stored HTML Injection)
github.com/4m3rr0r/PoCVulDb/issues/4