CVE-2024-1111: CWE-79 Cross Site Scripting in SourceCodester QR Code Login System
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-1111 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester QR Code Login System, specifically within the add-user.php file. The vulnerability arises from improper sanitization or validation of the 'qr-code' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS issue. The attack vector is remote and does not require authentication, but it does require user interaction, such as a victim clicking a crafted link or visiting a malicious webpage that triggers the vulnerable parameter. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as the attacker can execute scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Confidentiality and availability impacts are not directly affected by this vulnerability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a specialized QR code login system likely used in web applications for authentication purposes.
Potential Impact
For European organizations using SourceCodester QR Code Login System 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions and trust. While the direct impact on backend systems is limited, the exploitation of this XSS flaw can lead to phishing attacks, credential theft, or unauthorized actions performed on behalf of legitimate users. This can result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised through session hijacking or data exfiltration. Organizations relying on this system for authentication should be aware that attackers can remotely exploit this vulnerability without needing credentials, increasing the risk profile. However, since the vulnerability requires user interaction, the risk can be somewhat mitigated by user awareness and security controls. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether they are using SourceCodester QR Code Login System version 1.0. If so, immediate steps should include implementing strict input validation and output encoding on the 'qr-code' parameter within add-user.php to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Organizations should also conduct security awareness training to educate users about the risks of clicking unknown links or interacting with suspicious QR codes. Monitoring web application logs for unusual input patterns targeting the 'qr-code' parameter can help detect exploitation attempts. Since no official patch is currently available, organizations might consider isolating or replacing the vulnerable component with a more secure alternative. Additionally, employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this parameter can provide a compensating control until a patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2024-1111: CWE-79 Cross Site Scripting in SourceCodester QR Code Login System
Description
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-1111 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester QR Code Login System, specifically within the add-user.php file. The vulnerability arises from improper sanitization or validation of the 'qr-code' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS issue. The attack vector is remote and does not require authentication, but it does require user interaction, such as a victim clicking a crafted link or visiting a malicious webpage that triggers the vulnerable parameter. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as the attacker can execute scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Confidentiality and availability impacts are not directly affected by this vulnerability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a specialized QR code login system likely used in web applications for authentication purposes.
Potential Impact
For European organizations using SourceCodester QR Code Login System 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions and trust. While the direct impact on backend systems is limited, the exploitation of this XSS flaw can lead to phishing attacks, credential theft, or unauthorized actions performed on behalf of legitimate users. This can result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised through session hijacking or data exfiltration. Organizations relying on this system for authentication should be aware that attackers can remotely exploit this vulnerability without needing credentials, increasing the risk profile. However, since the vulnerability requires user interaction, the risk can be somewhat mitigated by user awareness and security controls. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether they are using SourceCodester QR Code Login System version 1.0. If so, immediate steps should include implementing strict input validation and output encoding on the 'qr-code' parameter within add-user.php to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Organizations should also conduct security awareness training to educate users about the risks of clicking unknown links or interacting with suspicious QR codes. Monitoring web application logs for unusual input patterns targeting the 'qr-code' parameter can help detect exploitation attempts. Since no official patch is currently available, organizations might consider isolating or replacing the vulnerable component with a more secure alternative. Additionally, employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this parameter can provide a compensating control until a patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-31T12:56:06.535Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae282968d
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:28:09 AM
Last updated: 8/16/2025, 11:16:34 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.