Unrated severityNVD Advisory· Published Jan 7, 2026· Updated Mar 5, 2026
FaceSentry Access Control System 6.4.8 Reflected Cross-Site Scripting via pluginInstall.php
CVE-2019-25277
Description
FaceSentry Access Control System 6.4.8 contains a cross-site scripting vulnerability in the 'msg' parameter of pluginInstall.php that allows attackers to inject malicious scripts. Attackers can exploit the unvalidated input to execute arbitrary JavaScript in victim browsers, potentially stealing authentication credentials and conducting phishing attacks.
Affected products
2- Range: =6.4.8
- iWT Ltd./FaceSentry Access Control Systemv5Range: 6.4.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- packetstormsecurity.com/files/153494mitreexploit
- cxsecurity.com/issue/WLB-2019070017mitrethird-party-advisory
- www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5527.phpmitrethird-party-advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/163191mitrevdb-entry
News mentions
0No linked articles in our index yet.