### [CVE-2019-14228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14228) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Xavier PHP Management Panel 3.0 is vulnerable to Reflected POST-based XSS via the username parameter when registering a new user at admin/includes/adminprocess.php. If there is an error when registering the user, the unsanitized username will reflect via the error page. Due to the lack of CSRF protection on the admin/includes/adminprocess.php endpoint, an attacker is able to chain the XSS with CSRF in order to cause remote exploitation. ### POC #### Reference - https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ - https://m-q-t.github.io/notes/xavier-csrf-to-xss-takeover/ #### Github No PoCs found on GitHub currently.