SourceCodester Student Result Management System 10, Cross-Site Scripting (XSS), CVE-2025-6477 (Medium)

Listen to this Post

How CVE-2025-6477 Works

The vulnerability exists in the `/script/admin/system` component of SourceCodester Student Result Management System 1.0. An attacker can inject malicious JavaScript via the `School Name` parameter due to improper input sanitization. When an admin views the System Settings Page, the payload executes in their browser context, allowing session hijacking or unauthorized actions. The attack is remotely exploitable with low complexity but requires high privileges (admin access). The CVSS 4.0 vector (AV:N/AC:L/PR:H/UI:P) reflects these conditions.

DailyCVE Form

Platform: SourceCodester
Version: 1.0
Vulnerability: XSS
Severity: Medium
Date: 06/25/2025

Prediction: 07/15/2025

What Undercode Say

curl -X POST -d "School_Name=<script>alert(1)</script>" http://target/script/admin/system
UPDATE system_settings SET school_name = '<script>malicious_code</script>' WHERE id = 1;

How Exploit

1. Craft XSS payload

2. Inject via School Name

3. Trigger via admin view

Protection from this CVE

1. Input sanitization

2. Output encoding

3. CSP headers

Impact

1. Session hijacking

2. Admin compromise

3. Data theft

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top