Simple User Management System with PHP-MySQL v1.0 is vulnerable to Cross-Site Scripting (XSS) via the Profile Section. The system fails to properly sanitize user input, allowing attackers to inject and execute arbitrary JavaScript when the input is displayed in the browser
                
            Metrics
Affected Vendors & Products
Advisories
    No advisories yet.
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        | Link | Providers | 
|---|---|
| https://github.com/sanin-s1r3n/CVE-Research/blob/main/CVE-5 | 
                     | 
            
History
                    Mon, 03 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics | 
        
        cvssV3_1
         
 
  | 
Mon, 03 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Simple User Management System with PHP-MySQL v1.0 is vulnerable to Cross-Site Scripting (XSS) via the Profile Section. The system fails to properly sanitize user input, allowing attackers to inject and execute arbitrary JavaScript when the input is displayed in the browser | |
| References | 
         | 
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-03T15:34:39.978Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63442
Updated: 2025-11-03T15:33:29.621Z
Status : Received
Published: 2025-11-03T15:15:36.303
Modified: 2025-11-03T16:15:36.240
Link: CVE-2025-63442
No data.
                        OpenCVE Enrichment
                    No data.