A vulnerability was found in withstars Books-Management-System 1.0. It has been classified as problematic. Affected is an unknown function of the file /book_edit_do.html of the component Book Edit Page. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/XSS.md | Exploit |
https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/XSS.md | Exploit |
https://vuldb.com/?ctiid.306294 | Permissions Required VDB Entry |
https://vuldb.com/?id.306294 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.557146 | Third Party Advisory VDB Entry |
Configurations
History
12 May 2025, 19:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:withstars:books-management-system:1.0:*:*:*:*:*:*:* | |
CWE | CWE-79 | |
First Time |
Withstars books-management-system
Withstars |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.1 |
References | () https://vuldb.com/?submit.557146 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?ctiid.306294 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.306294 - Third Party Advisory, VDB Entry | |
References | () https://github.com/caigo8/CVE-md/blob/main/Books-Management-System/XSS.md - Exploit |
28 Apr 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
27 Apr 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-27 04:15
Updated : 2025-05-12 19:24
NVD link : CVE-2025-3958
Mitre link : CVE-2025-3958
JSON object : View
Products Affected
withstars
- books-management-system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')