# Exploit Title: EgavilanMedia PHPCRUD 1.0 - 'Full Name' Stored Cross Site Scripting# Exploit Author: Mahendra Purbia# Vendor Homepage: http://egavilanmedia.com# Software Link: https://egavilanmedia.com/crud-operation-with-php-mysql-bootstrap-and-dompdf/# Version: 1.0# Tested on: Windows 10
Vulnerable Parameters: Full Name
Steps for reproduce:1. go to http://localhost/PHPCRUD/2. now click on "add new record"and fill the details (in first name name use :"><svg onload=alert(1)//)3. Now reload the page and you will see that our XSS payload executed . Its an Stored XSS.