VYPR
Medium severity6.4NVD Advisory· Published Jan 26, 2026· Updated Apr 15, 2026

CVE-2020-36954

CVE-2020-36954

Description

Xeroneit Library Management System 3.1 contains a stored cross-site scripting vulnerability in the Book Category feature that allows administrators to inject malicious scripts. Attackers can insert a payload in the Category Name field to execute arbitrary JavaScript code when the page is loaded.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Xeroneit Library Management System 3.1 is vulnerable to stored XSS in the Book Category feature, allowing admin-level JavaScript injection.

Vulnerability

Xeroneit Library Management System version 3.1 contains a stored cross-site scripting (XSS) vulnerability in the Book Category feature [1][2]. The root cause is improper neutralization of user input when processing the Category Name field; the application fails to sanitize or escape the input before storing it and later rendering it on the page [2].

Exploitation

An attacker must be logged in as an administrator to access the Book Category menu [3]. From there, the attacker can add a new category and inject a payload such as "><img src onerror=alert(1)> into the Category Name field [3]. The payload is stored and executed in the browser of any user who subsequently views the category page, requiring no further interaction from the victim beyond normal page load [2][3].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the affected application [2]. This can lead to session hijacking, defacement, or redirection to malicious sites, depending on the attacker's script. The attack is persistent and may affect multiple users until the malicious category entry is removed.

Mitigation

The vendor has not released a patched version for this vulnerability as of the publication date [2]. Users are advised to limit administrative access to trusted personnel, review all category input manually, or consider using a web application firewall (WAF) to block common XSS payloads. Third-party advisories confirm the issue affects version 3.1 and possibly earlier releases [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.