Cross-site Scripting (XSS) - Reflected in francoisjacquet/rosariosis


Reported on

May 9th 2022


Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way.

Proof of Concept

1.Login as admin (administrator / administrator).

2.Access this URL;alert(1);ajaxLink(%27&modfunc=remove&modname=Discipline/Referrals.php -> payload of id param will be reflected.

3.Click on "CANCEL" button -> XSS will be triggered.




  • If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:

+Perform any action within the application that the user can perform.

+View any information that the user is able to view.

+Modify any information that the user is able to modify.

  • Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user. There are various means by which an attacker might induce a victim user to make a request that they control, to deliver a reflected XSS attack. These include placing links on a website controlled by the attacker, or on another website that allows content to be generated, or by sending a link in an email, tweet or other message
We are processing your report and will contact the francoisjacquet/rosariosis team within 24 hours. 19 days ago
We have contacted a member of the francoisjacquet/rosariosis team and are waiting to hear back 18 days ago
François Jacquet validated this vulnerability 18 days ago
dungtuanha has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
François Jacquet confirmed that a fix has been merged on 788a4a 18 days ago
François Jacquet has been awarded the fix bounty
Prompts.php#L48 has been validated
to join this conversation