Description
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
Timeline
| 2025-12-06: | Advisory disclosed |
| 2025-12-06: | VulDB entry created |
| 2025-12-06: | VulDB entry last update |
Credits
0202h (VulDB User)
References
github.com/...nt-services-using-MYSQL-and-php web 1 xxs.docx
vuldb.com/?id.334621 (VDB-334621 | alokjaiswal Hotel-Management-services-using-MYSQL-and-php dishsub.php cross site scripting)
vuldb.com/?ctiid.334621 (VDB-334621 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.699994 (Submit #699994 | Hotel-Management-services-using-MYSQL-and-php web 1 web 1 XSS vulnerability)
github.com/...nt-services-using-MYSQL-and-php web 1 xxs.docx