Description: Stored XSS vulnerability in SeedDMS
Version affected: SeedDMS - v6.0.32
Version fixed: N/A
System: https://sourceforge.net/projects/seeddms/files/seeddms-6.0.32/
Researcher: Simon Njuguna
Proof of concept
Description: A stored cross-site scripting (XSS) vulnerability exists in SeedDMS
6.0.32. This vulnerability allows an attacker to inject malicious
JavaScript payloads by creating a folder/document with an XSS payload as the document name add adding the folder/document to the clipboard.
Steps to reproduce the vulnerability
Create a folder with the name <script>alert(0)</script>

Drag the folder and drop it in the clipboard

Click the folder name or refresh the page
