Impact
The flaw occurs in the /demo.php script of Xiaopi Panel 1.0.0 when the param argument is reflected without proper sanitization, allowing an attacker to inject arbitrary HTML or JavaScript. The injected code runs in the victim’s browser, which can enable credential theft, defacement, or the execution of other client‑side attacks. The vulnerability is a reflected XSS that is publicly documented and an exploit script is available.
Affected Systems
The affected product is Xiaopi Panel 1.0.0. All installations that expose the demo.php endpoint with the vulnerable param handling are impacted.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, and the EPSS score is below 1 %, reflecting a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Remote exploitation is possible by sending a crafted URL to a vulnerable host. Because the flaw is client‑side, it does not compromise the server directly, but it can lead to data theft or session hijacking when a user visits the affected page.
OpenCVE Enrichment