2025-04-15 20:12:09
icscert
PUBLISHED
An authenticated attacker can achieve stored XSS by exploiting improper sanitization of the plant name value while adding or editing a plant.