Description
Vvveb before 1.0.8.3 contains a stored cross-site scripting vulnerability in the customer signup flow where the Signup::addUser() controller copies raw POST username values into the display_name field before sanitization occurs. Attackers can submit HTML and script markup in the username field during signup, which gets stripped from the username column but persisted verbatim in the display_name column, allowing stored XSS execution when display_name is rendered without encoding in vulnerable views.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
Any version before 1.0.8.3
fefac290a8c85d3c87fe80ffed68b6c5bc50e93c (git)
Credits
Basant Kumar (@CyberWarrior9)
VulnCheck
References
github.com/givanz/Vvveb/releases/tag/1.0.8.3
github.com/...ommit/fefac290a8c85d3c87fe80ffed68b6c5bc50e93c
www.vulncheck.com/.../vvveb-stored-xss-via-signup-controller