A critical reflected cross-site scripting (XSS) vulnerability has been discovered in phpMyBackupPro, a widely-used open-source MySQL backup tool. The flaw affects the web interface and can allow attackers to inject malicious scripts through unsanitized GET parameters.
The vulnerability is classified as a reflected XSS, which can be triggered by a crafted URL containing malicious JavaScript code. Affected scripts include index.php
and config.php
, where user input is reflected into the page output without proper sanitization. This can lead to session hijacking, phishing attacks, or other malicious actions if a logged-in administrator clicks the malicious link.
https://example.com/phpmybackuppro/index.php?message=<script>alert(1)</script>
Developers are advised to sanitize all user-controlled input using secure output encoding methods such as htmlspecialchars()
in PHP. Avoid echoing raw $_GET
or $_POST
data directly into HTML output. Implementing input validation and content security policies (CSP) is also recommended.
A CVE (Common Vulnerabilities and Exposures) identifier has been requested for this issue to support coordinated public tracking and awareness.