The application fails to properly sanitize user-controlled input within group and role management functionality. Multiple input fields (three distinct group-related fields) can be injected with malicious JavaScript payloads, which are then stored server-side.
These stored payloads are later rendered unsafely within privileged administrative views without proper output encoding, leading to stored cross-site scripting (XSS) within the role and permission management context.
Endpoints:
- /backend/users/groupList/
<img src=x onerror=alert(document.domain)>https://mega.nz/file/6QUEXDbR#JXzYXg9bef_NeSUVFB4R03UeXLtAVtYwTRsdrHLlokU
{
"cwe_ids": [
"CWE-79"
],
"github_reviewed_at": "2026-04-01T00:10:00Z",
"nvd_published_at": "2026-03-30T21:17:10Z",
"severity": "CRITICAL",
"github_reviewed": true
}