LOWCVE-2023-6462CVSS 3.5

SourceCodester User Registration and Login System delete-user.php cross site scripting

wordt vertaald…

Platform

php

Component

vulndis

Opgelost in

1.0.1

AI Confidence: highNVDEPSS 0.1%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

A problematic cross-site scripting (XSS) vulnerability has been identified in SourceCodester User Registration and Login System versions 1.0 through 1.0. This flaw allows attackers to inject malicious scripts into the application, potentially compromising user sessions and data. The vulnerability resides within the /endpoint/delete-user.php file and is addressed in version 1.0.1.

Impact en Aanvalsscenarioswordt vertaald…

Successful exploitation of CVE-2023-6462 allows an attacker to execute arbitrary JavaScript code within the context of a victim's browser session. This can lead to various malicious activities, including session hijacking, credential theft, and defacement of the application. The attacker could potentially steal sensitive user data, such as usernames, passwords, and personal information. Given the nature of XSS, the impact can range from minor annoyance to complete compromise of the application and its users, depending on the attacker's goals and the privileges of the affected user.

Uitbuitingscontextwordt vertaald…

This vulnerability has been publicly disclosed and a proof-of-concept may be available. The CVSS score is LOW, suggesting that exploitation may require specific conditions or user interaction. It is not currently listed on CISA KEV. Monitor security advisories and threat intelligence feeds for any indications of active exploitation campaigns targeting this vulnerability.

Wie Loopt Risicowordt vertaald…

Organizations utilizing SourceCodester User Registration and Login System in their applications, particularly those with user-facing features and sensitive data, are at risk. Shared hosting environments where multiple users share the same server instance are especially vulnerable, as a compromised user account could potentially impact other users on the same server.

Detectiestappenwordt vertaald…

• php / web:

curl -I 'http://your-website.com/endpoint/delete-user.php?user=<script>alert(1)</script>' | grep -i 'content-type'

• generic web:

curl -s 'http://your-website.com/endpoint/delete-user.php?user=<script>alert(1)</script>' | grep 'alert(1)'

Aanvalstijdlijn

  1. Disclosure

    disclosure

  2. Patch

    patch

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

0.08% (24% percentiel)

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N3.5LOWAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredLowVereist authenticatieniveau voor aanvalUser InteractionRequiredOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityNoneRisico op blootstelling van gevoelige dataIntegrityLowRisico op ongeautoriseerde gegevenswijzigingAvailabilityNoneRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Laag — elk geldig gebruikersaccount is voldoende.
User Interaction
Vereist — slachtoffer moet een bestand openen, op een link klikken of een pagina bezoeken.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Geen — geen vertrouwelijkheidsimpact.
Integrity
Laag — aanvaller kan enkele gegevens met beperkte omvang aanpassen.
Availability
Geen — geen beschikbaarheidsimpact.

Getroffen Software

Componentvulndis
LeverancierSourceCodester
Getroffen bereikOpgelost in
1.0 – 1.01.0.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2023-6462 is to upgrade to version 1.0.1 of the SourceCodester User Registration and Login System. If upgrading is not immediately feasible, consider implementing input validation and output encoding on the /endpoint/delete-user.php file to sanitize user-supplied data. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a temporary layer of protection. Regularly review and update security policies and procedures to prevent similar vulnerabilities from arising in the future. After upgrade, confirm functionality by attempting to delete a user account and verifying that no malicious scripts are executed.

Hoe te verhelpenwordt vertaald…

Actualizar a una versión parcheada o aplicar la corrección proporcionada por el proveedor. Validar y limpiar las entradas del usuario en el script `delete-user.php` para evitar la inyección de código XSS. Escapar la salida HTML para prevenir la ejecución de scripts maliciosos.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2023-6462 — XSS in SourceCodester User Registration and Login System?

CVE-2023-6462 is a cross-site scripting (XSS) vulnerability affecting SourceCodester User Registration and Login System versions 1.0-1.0, allowing attackers to inject malicious scripts.

Am I affected by CVE-2023-6462 in SourceCodester User Registration and Login System?

You are affected if you are using SourceCodester User Registration and Login System versions 1.0 through 1.0. Upgrade to 1.0.1 to mitigate the risk.

How do I fix CVE-2023-6462 in SourceCodester User Registration and Login System?

Upgrade to version 1.0.1 of SourceCodester User Registration and Login System. Input validation and output encoding can provide temporary protection.

Is CVE-2023-6462 being actively exploited?

While publicly disclosed, there are no confirmed reports of active exploitation at this time. Monitor security advisories for updates.

Where can I find the official SourceCodester advisory for CVE-2023-6462?

Refer to the SourceCodester website and security advisories for the latest information regarding CVE-2023-6462 and available patches.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.