🛡️ NeuroSploit Security Assessment Report

Target: http://testphp.vulnweb.com/ | Agent ID: a29c170f | Mode: AI Prompt Mode

Date: Monday, January 19, 2026

📊 Executive Summary

This security assessment of http://testphp.vulnweb.com/ was conducted using NeuroSploit AI-powered penetration testing platform. The assessment identified 21 security findings across various severity levels. 4 critical vulnerabilities require immediate attention. 1 high-severity issues should be addressed promptly.

Overall Risk Score
100/100
Critical Risk
21
Total
4
Critical
1
High
6
Medium
10
Low
0
Info

🔍 Detailed Findings

critical Finding #1

SQLI in /listproducts.php

http://testphp.vulnweb.com/listproducts.php?cat='

CVSS 3.1 Score
9.1 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
OWASP Top 10
A03:2021 - Injection
Vulnerability Type
sqli

🎯 Affected Endpoint

http://testphp.vulnweb.com/listproducts.php?cat='

🔍 Evidence / Proof of Concept

SQL error message: 'sql syntax'
critical Finding #2

SQLI in /artists.php

http://testphp.vulnweb.com/artists.php?artist='

CVSS 3.1 Score
9.1 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
OWASP Top 10
A03:2021 - Injection
Vulnerability Type
sqli

🎯 Affected Endpoint

http://testphp.vulnweb.com/artists.php?artist='

🔍 Evidence / Proof of Concept

SQL error message: 'sql syntax'
critical Finding #3

SQLI in /search.php

http://testphp.vulnweb.com/search.php?test='

CVSS 3.1 Score
9.1 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
OWASP Top 10
A03:2021 - Injection
Vulnerability Type
sqli

🎯 Affected Endpoint

http://testphp.vulnweb.com/search.php?test='

🔍 Evidence / Proof of Concept

SQL error message: 'sql syntax'
medium Finding #4

Missing Clickjacking Protection

http://testphp.vulnweb.com/

CVSS 3.1 Score
4 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-1021
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
clickjacking

📋 Description

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/

🔍 Evidence / Proof of Concept

X-Frame-Options: Not set
CSP: Not set

✅ Remediation

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

low Finding #5

Missing X-Content-Type-Options Header

http://testphp.vulnweb.com/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_xcto

📋 Description

Missing nosniff header allows MIME-sniffing attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/

🔍 Evidence / Proof of Concept

X-Content-Type-Options: Not set

✅ Remediation

Add 'X-Content-Type-Options: nosniff' header.

low Finding #6

Missing Content-Security-Policy Header

http://testphp.vulnweb.com/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_csp

📋 Description

No Content-Security-Policy header, increasing XSS risk.

🎯 Affected Endpoint

http://testphp.vulnweb.com/

🔍 Evidence / Proof of Concept

Content-Security-Policy: Not set

✅ Remediation

Implement a restrictive Content-Security-Policy.

medium Finding #7

Missing Clickjacking Protection

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

CVSS 3.1 Score
4 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-1021
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
clickjacking

📋 Description

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

🔍 Evidence / Proof of Concept

X-Frame-Options: Not set
CSP: Not set

✅ Remediation

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

low Finding #8

Missing X-Content-Type-Options Header

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_xcto

📋 Description

Missing nosniff header allows MIME-sniffing attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

🔍 Evidence / Proof of Concept

X-Content-Type-Options: Not set

✅ Remediation

Add 'X-Content-Type-Options: nosniff' header.

low Finding #9

Missing Content-Security-Policy Header

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_csp

📋 Description

No Content-Security-Policy header, increasing XSS risk.

🎯 Affected Endpoint

http://testphp.vulnweb.com/Mod_Rewrite_Shop/

🔍 Evidence / Proof of Concept

Content-Security-Policy: Not set

✅ Remediation

Implement a restrictive Content-Security-Policy.

medium Finding #10

Missing Clickjacking Protection

http://testphp.vulnweb.com/hpp/

CVSS 3.1 Score
4 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-1021
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
clickjacking

📋 Description

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/hpp/

🔍 Evidence / Proof of Concept

X-Frame-Options: Not set
CSP: Not set

✅ Remediation

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

low Finding #11

Missing X-Content-Type-Options Header

http://testphp.vulnweb.com/hpp/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_xcto

📋 Description

Missing nosniff header allows MIME-sniffing attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/hpp/

🔍 Evidence / Proof of Concept

X-Content-Type-Options: Not set

✅ Remediation

Add 'X-Content-Type-Options: nosniff' header.

low Finding #12

Missing Content-Security-Policy Header

http://testphp.vulnweb.com/hpp/

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_csp

📋 Description

No Content-Security-Policy header, increasing XSS risk.

🎯 Affected Endpoint

http://testphp.vulnweb.com/hpp/

🔍 Evidence / Proof of Concept

Content-Security-Policy: Not set

✅ Remediation

Implement a restrictive Content-Security-Policy.

medium Finding #13

Missing Clickjacking Protection

http://testphp.vulnweb.com/admin

CVSS 3.1 Score
4 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-1021
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
clickjacking

📋 Description

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/admin

🔍 Evidence / Proof of Concept

X-Frame-Options: Not set
CSP: Not set

✅ Remediation

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

low Finding #14

Missing X-Content-Type-Options Header

http://testphp.vulnweb.com/admin

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_xcto

📋 Description

Missing nosniff header allows MIME-sniffing attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/admin

🔍 Evidence / Proof of Concept

X-Content-Type-Options: Not set

✅ Remediation

Add 'X-Content-Type-Options: nosniff' header.

low Finding #15

Missing Content-Security-Policy Header

http://testphp.vulnweb.com/admin

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_csp

📋 Description

No Content-Security-Policy header, increasing XSS risk.

🎯 Affected Endpoint

http://testphp.vulnweb.com/admin

🔍 Evidence / Proof of Concept

Content-Security-Policy: Not set

✅ Remediation

Implement a restrictive Content-Security-Policy.

medium Finding #16

Missing Clickjacking Protection

http://testphp.vulnweb.com/listproducts.php?cat=1

CVSS 3.1 Score
4 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-1021
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
clickjacking

📋 Description

The page lacks X-Frame-Options header and CSP frame-ancestors directive, making it vulnerable to clickjacking attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/listproducts.php?cat=1

🔍 Evidence / Proof of Concept

X-Frame-Options: Not set
CSP: Not set

✅ Remediation

Add 'X-Frame-Options: DENY' or 'X-Frame-Options: SAMEORIGIN' header, or use 'frame-ancestors' in CSP.

low Finding #17

Missing X-Content-Type-Options Header

http://testphp.vulnweb.com/listproducts.php?cat=1

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_xcto

📋 Description

Missing nosniff header allows MIME-sniffing attacks.

🎯 Affected Endpoint

http://testphp.vulnweb.com/listproducts.php?cat=1

🔍 Evidence / Proof of Concept

X-Content-Type-Options: Not set

✅ Remediation

Add 'X-Content-Type-Options: nosniff' header.

low Finding #18

Missing Content-Security-Policy Header

http://testphp.vulnweb.com/listproducts.php?cat=1

CVSS 3.1 Score
3 Low
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
CWE Reference
CWE-693
OWASP Top 10
A05:2021 - Security Misconfiguration
Vulnerability Type
missing_csp

📋 Description

No Content-Security-Policy header, increasing XSS risk.

🎯 Affected Endpoint

http://testphp.vulnweb.com/listproducts.php?cat=1

🔍 Evidence / Proof of Concept

Content-Security-Policy: Not set

✅ Remediation

Implement a restrictive Content-Security-Policy.

medium Finding #19

Cross-Site Request Forgery (CSRF)

http://testphp.vulnweb.com/listproducts.php?cat=1&action=delete&id=1

CVSS 3.1 Score
6.8 Medium
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE Reference
CWE-352
OWASP Top 10
A01:2021 - Broken Access Control
Vulnerability Type
cross-site_request_forgery_(csrf)

📋 Description

CSRF attacks force authenticated users to perform unintended actions on web applications where they're authenticated. Attackers can trick users into executing actions without their knowledge through malicious requests. AI Explanation: This represents a classic CSRF vulnerability where a destructive action (delete) can be triggered via GET request. State-changing operations should never use GET methods as they can be easily exploited through CSRF attacks via image tags, links, or other GET-based requests.

🎯 Affected Endpoint

http://testphp.vulnweb.com/listproducts.php?cat=1&action=delete&id=1

🔍 Evidence / Proof of Concept

URL contains state-changing action (delete) via GET method: /listproducts.php?cat=1&action=delete&id=1

✅ Remediation

Implement proper CSRF tokens for all state-changing operations Use POST requests exclusively for all destructive or state-changing actions Add SameSite cookie attributes to session cookies Implement Origin/Referer header validation for sensitive operations Review and secure the delete functionality in listproducts.php to require POST with CSRF protection Conduct follow-up testing on the admin panel and user registration endpoints after accessing the actual forms

high Finding #20

Brute Force Attack

http://testphp.vulnweb.com/secured/newuser.php

CVSS 3.1 Score
7.5 High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CWE Reference
CWE-307
Vulnerability Type
brute_force_attack

📋 Description

Brute force attacks attempt to gain unauthorized access by systematically trying multiple combinations of usernames and passwords, or by exploiting weak authentication mechanisms. This includes testing for weak credentials, lack of account lockout mechanisms, and insufficient rate limiting. AI Explanation: The 'secured' directory is accessible without authentication, returning a complete HTML page for adding new users. This bypasses intended access controls and allows unauthorized access to administrative functions.

🎯 Affected Endpoint

http://testphp.vulnweb.com/secured/newuser.php

🔍 Evidence / Proof of Concept

HTTP 200 status code with full page content (415 bytes) for /secured/newuser.php without authentication. Page title 'add new user' indicates administrative functionality.

✅ Remediation

Implement proper authentication controls for the /secured/ directory using .htaccess, server configuration, or application-level authentication Review all directories named 'secured', 'admin', or similar to ensure proper access controls are enforced Implement session-based authentication for administrative functions like user creation Add input validation and authorization checks to administrative endpoints Consider implementing rate limiting and account lockout mechanisms for authentication endpoints Regularly audit directory permissions and access controls

critical Finding #21

SQLI in /product.php

http://testphp.vulnweb.com/product.php?pic='

CVSS 3.1 Score
9.1 Critical
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
OWASP Top 10
A03:2021 - Injection
Vulnerability Type
sqli

🎯 Affected Endpoint

http://testphp.vulnweb.com/product.php?pic='

🔍 Evidence / Proof of Concept

SQL error message: 'sql syntax'