XSS vulnerability through a search results page.
The search query is sent as a GET parameter and although escaped correctly in the HTML form, it is not escaped when included as a parameter in the pagination links. This allows code to be executed directly from a malicious URL.
<span class="page"><a href="/consultations/?status=closed&lang=en&view=Search results&sch=education"></a><script>alert()</script><span data="&sessionid=9245882&pageNum=1&filter_year=all">1</a></span>
Reported Fixed
Back