{ "schema_version": "1.4.0", "id": "GHSA-r9rv-3x3p-cg37", "modified": "2024-04-04T01:23:21Z", "published": "2022-05-24T16:51:30Z", "aliases": [ "CVE-2019-14228" ], "details": "Xavier PHP Management Panel 3.0 is vulnerable to Reflected POST-based XSS via the username parameter when registering a new user at admin/includes/adminprocess.php. If there is an error when registering the user, the unsanitized username will reflect via the error page. Due to the lack of CSRF protection on the admin/includes/adminprocess.php endpoint, an attacker is able to chain the XSS with CSRF in order to cause remote exploitation.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-14228" }, { "type": "WEB", "url": "https://codecanyon.net/item/xavier-php-login-script-user-management/9146226" }, { "type": "WEB", "url": "https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover" } ], "database_specific": { "cwe_ids": [ "CWE-352" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-07-26T13:15:00Z" } }