Impact
The vulnerability resides in the '/reports/generate/specific_customer' endpoint of PHP Point Of Sale version 19.4. Request parameters 'start_date_formatted' and 'end_date_formatted' are not properly validated, permitting an attacker to embed arbitrary HTML. This flaw can result in cross‑site scripting (XSS) when the report is generated and viewed in the user’s browser.
Affected Systems
This issue affects PHP Point Of Sale version 19.4 running within the PHP Point Of Sale software itself.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate severity. The EPSS score is unavailable, and the vulnerability is not listed in CISA KEV. Exploitation likely requires access to the vulnerable endpoint, which may be limited to authenticated users depending on the deployment. No official patch is currently available, so the risk remains until the vendor releases a fix or a mitigation is applied.
OpenCVE Enrichment