
Cloud Vulnerability DB
A community-led vulnerabilities database
Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint. The vulnerability was discovered on January 16, 2025, and publicly disclosed on March 7, 2025. The issue has been assigned a CVSS 3.1 Base Score of 5.4 (MEDIUM) (NIST NVD).
The vulnerability exists in the crea_backup.php endpoint where the ripristina_backup parameter is processed without proper sanitization or encoding, allowing direct reflection of user input into the page. This reflected XSS vulnerability requires a valid authenticated session to exploit. The attack vector involves crafting a malicious URL that injects arbitrary JavaScript into the page rendered for an authenticated user (Huy Vo Blog).
The vulnerability can lead to multiple security impacts including session hijacking through cookie theft, phishing attacks through malicious redirects, and potential abuse of administrative privileges. If exploited against an administrator, an attacker could potentially modify system settings or manipulate sensitive data (Huy Vo Blog).
Recommended mitigations include implementing server-side input validation, proper output encoding using functions like htmlspecialchars() in PHP, implementing a strict Content Security Policy (CSP), and ensuring secure session management with HttpOnly and SameSite cookie flags (Huy Vo Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."