Affected Project: Profile Registration without Reload/Refresh
Official Website: https://www.sourcecodester.com/php/17587/profile-registration-without-reloadrefresh-using-ajax-php-and-mysql-source-code.html
Version: 1.0
Related Code file: add.php
Injection parameters: email_address, address, company_name, job_title, jobDescription
The parameters: email_address, address ,company_name, job_title, jobDescription parameter are all vulnerable to the tested XSS payload: <script>alert('parameter_name XSS')</script>. This string is injected to the webpage when it is loaded in the admin dashboard.
Application does not properly sanitize or validate the input, this script could be executed in the user's browser, leading to an XSS attack.
This vulnerability is similar to CVE-2024-9092 but addressed the part where the input does not need to be encoded and there is no front-end logic checking the input. Additionally the parameters other than full_name are affected.
Below is how Profile Registration without Reload/Refresh System looks like and with XSS payload filled in:
Upon sending the form containing XSS payload, we can verify the vulnerability from admin.php page:






