Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 26 Aug 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Phproject
Phproject phproject |
|
Vendors & Products |
Phproject
Phproject phproject |
Thu, 21 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Aug 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Phproject is a high performance full-featured project management system. From 1.8.0 to before 1.8.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Planned Hours field when creating a new project. When sending a POST request to /issues/new/, the value provided in the Planned Hours field is included in the server response without any HTML encoding or sanitization. Because of this, an attacker can craft a malicious payload such as <script>alert(1)</script> and include it in the planned_hours parameter. The server reflects the input directly in the HTML of the project creation page, causing the browser to interpret and execute it. This vulnerability is fixed in 1.8.3. | |
Title | Stored XSS in “hours” fields when creating or editing an issue, using SQLite database | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-08-21T20:02:12.244Z
Reserved: 2025-08-19T15:16:22.917Z
Link: CVE-2025-57768

Updated: 2025-08-21T20:02:07.436Z

Status : Awaiting Analysis
Published: 2025-08-21T18:15:36.877
Modified: 2025-08-22T18:08:51.663
Link: CVE-2025-57768

No data.

Updated: 2025-08-26T10:07:06Z