CVE-2025-63443 - School Management System PHP v1.0 XSS Vulnerability Discoverer: Shuvo Ahmed Sanin (A Researcher From Red Team Bangladesh) Vulnerable Component: login.php via the password parameter Code Execution: True Steps to Reproduce: 1. Go to Login Section (https://localhost/school-management-system-php/login.php) 2. Fill up with User: test & Pass: test then intercept Login request with Burpsuite 3. Forward request until you get /school-management-system-php/login.php?error=Incorrect%20Username%20or%20Password 4. Add the request header to Burpsuite 5. Send this /school-management-system-php/login.php?error=Incorrect%20Username%20or%20Passwordalert("XSS") 6. Then Send the request and you will see 200 ok response 7. Go to response section and then right click>show response in browser 8. XSS executed and pop up Impact: 1. Session Hijacking: Attackers can steal authentication cookies. 2. Phishing Attacks: Users can be tricked into providing sensitive credentials. 3. Data Theft: Exploited XSS can lead to information disclosure. 4. Content Manipulation: Attackers can modify displayed content or deface the application. Mitigation: 1. Sanitize Input: Implement strict input validation and escape special characters. 2. Output Encoding: Encode user input before rendering it in the browser. 3. Implement CSP (Content Security Policy): Restrict execution of inline scripts. Reference: Shuvo Ahmed Sanin LinkedIn Profile