We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in kurniaramadhan E-Commerce-PHP 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/create_product.php of the component Create Product Page. The manipulation of the argument Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Eine problematische Schwachstelle wurde in kurniaramadhan E-Commerce-PHP 1.0 ausgemacht. Betroffen davon ist ein unbekannter Prozess der Datei /admin/create_product.php der Komponente Create Product Page. Mit der Manipulation des Arguments Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-01-08: | Advisory disclosed |
2025-01-08: | VulDB entry created |
2025-01-10: | VulDB entry last update |
Maloy Roy Orko
MaloyRoyOrko (VulDB User)
MaloyRoyOrko (VulDB User)
vuldb.com/?id.290798 (VDB-290798 | kurniaramadhan E-Commerce-PHP Create Product Page create_product.php cross site scripting)
vuldb.com/?ctiid.290798 (VDB-290798 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.471233 (Submit #471233 | kurniaramadhan Ecommerce-PHP-kurniaramadhan-1.0 1.0 SQL Injection)
www.websecurityinsights.my.id/...kurniaramadhan-sql.html?m=1
youtu.be/YHaoqELPbBQ?si=egd2TedZ1F-i-Qae
Support options