An issue was discovered in BTITeam XBTIT. By using String.replace and eval, it is possible to bypass the includes/crk_protection.php anti-XSS mechanism that looks for a number of dangerous fingerprints.
- https://rastating.github.io/xbtit-multiple-vulnerabilities/
No PoCs found on GitHub currently.