Skip to content

Reflected XSS on the home page #256

@MatanSandori

Description

@MatanSandori

Describe your issue

Hi, I’m a security researcher building my CVE portfolio. I found a reflected XSS on the WikiDocs home page.

Proof of concept

http://127.0.0.1/"><script>alert(42)</script>
http://127.0.0.1/%22%3E%3Cscript%3Ealert(1)%3C/script%3E

Path input should be HTML-escaped (e.g., htmlspecialchars($path, ENT_QUOTES, 'UTF-8')) so injected markup cannot run.

Can I report future issues privately via email or a contact form?

Best,
Matan Sandori

Device and settings

Setup: docker run -d -p 80:80 zavy86/wikidocs

Steps to reproduce

http://YOUR-HOST/"><script>alert(42)</script>
http://YOUR-HOST/%22%3E%3Cscript%3Ealert(1)%3C/script%3E

Screenshots (optional)

Image

Image

Extra fields

  • I'd like to work on this issue

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions