Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions index.php
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,14 @@
// test


echo $_GET['asdf'];
Copy link

@zeropath-ai-staging zeropath-ai-staging bot Feb 2, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reflected XSS in index.php via GET parameter 'asdf' (Severity: MEDIUM)

Reflected Cross-Site Scripting can occur, allowing attackers to inject malicious scripts into web pages viewed by other users. This happens because the value of the 'asdf' GET parameter is directly echoed on line 6 of index.php without proper sanitization, which could lead to session hijacking or credential theft.
View details in ZeroPath

Suggested change
echo $_GET['asdf'];
echo htmlspecialchars($_GET['asdf'], ENT_QUOTES, 'UTF-8');








// test

$userInput = isset($_GET['cmd']) ? $_GET['cmd'] : '';
Expand Down