CVE-2026-1151

2.4 LOW

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts via the Nickname field in the User Center component of technical-laohu mpay. When exploited, it enables cross-site scripting attacks that can steal user sessions or deface websites. Users of technical-laohu mpay versions up to 1.2.4 are affected.

💻 Affected Systems

Products:
  • technical-laohu mpay
Versions: up to 1.2.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the User Center component specifically when processing Nickname input.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal administrator credentials, take over the application, and compromise user data through persistent XSS payloads.

🟠

Likely Case

Session hijacking of regular users, credential theft, or website defacement through stored malicious scripts.

🟢

If Mitigated

Minimal impact with proper input validation, output encoding, and Content Security Policy headers in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available in GitHub issues, making this easy to weaponize for attackers with basic web skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to version 1.2.5 or later if released, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation to reject or sanitize HTML/JavaScript in Nickname field

Content Security Policy

all

Implement CSP headers to restrict script execution sources

Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Disable or restrict Nickname modification functionality in User Center
  • Implement web application firewall rules to block XSS payloads in Nickname parameter

🔍 How to Verify

Check if Vulnerable:

Test by entering <script>alert('XSS')</script> in Nickname field and check if script executes

Check Version:

Check application configuration or package manager for technical-laohu mpay version

Verify Fix Applied:

Verify that script tags in Nickname field are properly sanitized or rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual Nickname entries containing script tags or JavaScript code
  • Multiple failed validation attempts on Nickname field

Network Indicators:

  • HTTP requests with Nickname parameter containing script tags or encoded payloads

SIEM Query:

web_requests Nickname="*<script>*" OR Nickname="*javascript:*"

🔗 References

📤 Share & Export