Cross-site scripting (XSS) vulnerability in the comment section in ZrLog 2.1.3 allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.
Send a post request with the parameter username = "><img src=1 onerror=alert(document.cookie)>
The issues address: 94fzb/zrlog#56
Fixed:https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941