Description
MajorDoMo (aka Major Domestic Module) contains a reflected cross-site scripting (XSS) vulnerability in command.php. The $qry parameter is rendered directly into the HTML page without sanitization via htmlspecialchars(), both in an input field value attribute and in a paragraph element. An attacker can inject arbitrary JavaScript by crafting a URL with malicious content in the qry parameter.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Any version
Credits
Valentin Lobstein
References
chocapikk.com/posts/2026/majordomo-revisited/ (MajorDoMo Revisited: What I Missed in 2023)
github.com/sergejey/majordomo/pull/1177 (Fix PR: sergejey/majordomo#1177)
www.vulncheck.com/...cted-cross-site-scripting-in-commandphp (VulnCheck Advisory: MajorDoMo Reflected Cross-Site Scripting in command.php)