# Security Vulnerability Report
## Description
Please provide a clear and concise description of the security vulnerability.
## Vulnerability Details
- **Affected Component**: [e.g., specific module, feature, or code]
- **Vulnerability Type**: [e.g., XSS, SQL injection, etc.]
- **Impact**: [Describe the potential impact of the vulnerability]
## Steps to Reproduce
Outline the steps or conditions required to reproduce the vulnerability.
1. Step 1
2. Step 2
3. ...
## Expected Behavior
Describe what you would expect to happen without the vulnerability.
## Actual Behavior
Explain what actually happens due to the vulnerability.
## Additional Information
Any additional information that might be helpful, such as screenshots or logs.
## Contact Information
Please provide your contact information for further communication.
- **Name**: [Your Name]
- **Email**: [Your Email]
- **PGP Key**: [If applicable]