CVE-2024-1111: CWE-79 Cross Site Scripting in SourceCodester QR Code Login System
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2024-1111 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester QR Code Login System, specifically within the add-user.php file. The vulnerability arises from improper sanitization or validation of the 'qr-code' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS issue. The attack vector is remote and does not require authentication, but it does require user interaction, such as a victim clicking a crafted link or visiting a malicious webpage that triggers the vulnerable parameter. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as the attacker can execute scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Confidentiality and availability impacts are not directly affected by this vulnerability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a specialized QR code login system likely used in web applications for authentication purposes.
Potential Impact
For European organizations using SourceCodester QR Code Login System 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions and trust. While the direct impact on backend systems is limited, the exploitation of this XSS flaw can lead to phishing attacks, credential theft, or unauthorized actions performed on behalf of legitimate users. This can result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised through session hijacking or data exfiltration. Organizations relying on this system for authentication should be aware that attackers can remotely exploit this vulnerability without needing credentials, increasing the risk profile. However, since the vulnerability requires user interaction, the risk can be somewhat mitigated by user awareness and security controls. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether they are using SourceCodester QR Code Login System version 1.0. If so, immediate steps should include implementing strict input validation and output encoding on the 'qr-code' parameter within add-user.php to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Organizations should also conduct security awareness training to educate users about the risks of clicking unknown links or interacting with suspicious QR codes. Monitoring web application logs for unusual input patterns targeting the 'qr-code' parameter can help detect exploitation attempts. Since no official patch is currently available, organizations might consider isolating or replacing the vulnerable component with a more secure alternative. Additionally, employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this parameter can provide a compensating control until a patch is released.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2024-1111: CWE-79 Cross Site Scripting in SourceCodester QR Code Login System
Description
A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Login System 1.0. Affected by this issue is some unknown functionality of the file add-user.php. The manipulation of the argument qr-code leads to cross site scripting. The attack may be launched remotely. VDB-252470 is the identifier assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-1111 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the SourceCodester QR Code Login System, specifically within the add-user.php file. The vulnerability arises from improper sanitization or validation of the 'qr-code' parameter, which can be manipulated by an attacker to inject malicious scripts. This vulnerability is classified under CWE-79, indicating that it is a reflected or stored XSS issue. The attack vector is remote and does not require authentication, but it does require user interaction, such as a victim clicking a crafted link or visiting a malicious webpage that triggers the vulnerable parameter. The CVSS 3.1 base score is 4.3, indicating a medium severity level. The impact primarily affects the integrity of the system, as the attacker can execute scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Confidentiality and availability impacts are not directly affected by this vulnerability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects only version 1.0 of the product, which is a specialized QR code login system likely used in web applications for authentication purposes.
Potential Impact
For European organizations using SourceCodester QR Code Login System 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions and trust. While the direct impact on backend systems is limited, the exploitation of this XSS flaw can lead to phishing attacks, credential theft, or unauthorized actions performed on behalf of legitimate users. This can result in reputational damage, loss of customer trust, and potential regulatory scrutiny under GDPR if personal data is compromised through session hijacking or data exfiltration. Organizations relying on this system for authentication should be aware that attackers can remotely exploit this vulnerability without needing credentials, increasing the risk profile. However, since the vulnerability requires user interaction, the risk can be somewhat mitigated by user awareness and security controls. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation attempts.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether they are using SourceCodester QR Code Login System version 1.0. If so, immediate steps should include implementing strict input validation and output encoding on the 'qr-code' parameter within add-user.php to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Organizations should also conduct security awareness training to educate users about the risks of clicking unknown links or interacting with suspicious QR codes. Monitoring web application logs for unusual input patterns targeting the 'qr-code' parameter can help detect exploitation attempts. Since no official patch is currently available, organizations might consider isolating or replacing the vulnerable component with a more secure alternative. Additionally, employing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this parameter can provide a compensating control until a patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-31T12:56:06.535Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683879c8182aa0cae282968d
Added to database: 5/29/2025, 3:14:16 PM
Last enriched: 7/8/2025, 1:28:09 AM
Last updated: 10/16/2025, 5:13:05 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-0274: CWE-306 Missing Authentication for Critical Function in HCL Software BigFix Modern Client Management
MediumCVE-2025-11814: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Brainstorm Force Ultimate Addons for WPBakery
MediumCVE-2025-62580: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-62579: CWE-121 Stack-based Buffer Overflow in Delta Electronics ASDA-Soft
HighCVE-2025-10700: CWE-352 Cross-Site Request Forgery (CSRF) in elemntor Ally – Web Accessibility & Usability
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.