Skip to content

Conversation

@hugbubby
Copy link

@hugbubby hugbubby commented Dec 6, 2025

No description provided.

@zeropath-ai-dev
Copy link

No security or compliance issues detected. Reviewed everything up to f21a4c2.

Security Overview
Detected Code Changes
Change Type Relevant files
Other ► nbm.php
    Added echo $_GET['asdf'];

Reply to this PR with @zeropath-ai followed by a description of what change you want and we'll auto-submit a change to this PR to implement it.

trigger_notify('loading_lang');
load_language('lang', PHPWG_ROOT_PATH.PWG_LOCAL_DIR, array('no_fallback'=>true, 'local'=>true) );

echo $_GET['asdf'];

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reflected XSS Vulnerability in nbm.php (Severity: MEDIUM)

This reflected cross-site scripting (XSS) vulnerability in nbm.php allows an attacker to inject arbitrary JavaScript into the application, potentially leading to session hijacking or defacement. The vulnerability exists because the application directly reflects the asdf parameter from the GET request in the response on line 24 without proper sanitization or escaping, which causes the browser to execute any injected scripts.
View details in ZeroPath

Suggested change
echo $_GET['asdf'];
echo isset($_GET['asdf']) ? htmlspecialchars($_GET['asdf'], ENT_QUOTES|ENT_SUBSTITUTE, 'UTF-8') : '';

@zeropath-ai-staging
Copy link

Possible security or compliance issues detected. Reviewed everything up to f21a4c2.

The following issues were found:

Security Overview
Detected Code Changes
Change Type Relevant files
Other ► nbm.php
    Added echo $_GET['asdf'];

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants