Lifecycle Timeline
2DescriptionNVD
Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL with '/<PATH>.php/<XSS>'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
AnalysisAI
Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL with '/<PATH>.php/<XSS>'.
Technical ContextAI
Classified as CWE-79 (Cross-site Scripting (XSS)). Affects IsMyGym by Zuinq Studio. This vulnerability. Reflected Cross-Site Scripting (XSS) vulnerability in IsMyGym by Zuinq Studio. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending them a malicious URL with '/<PATH>.php/<XSS>'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
Affected ProductsAI
Product: IsMyGym by Zuinq Studio. This vulnerability.
RemediationAI
Monitor vendor advisories for a patch. Implement output encoding and Content Security Policy headers.
Share
External POC / Exploit Code
Leaving vuln.today