CVE-2025-65136
Reflected XSS in School-management-system 1.0 Contact Page
Publication date: 2026-04-14
Last updated on: 2026-04-14
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| manikandan580 | school_management_system | 1.0 |
| manikandan580 | school-management-system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-65136 is a reflected cross-site scripting (XSS) vulnerability found in the School Management System version 1.0 by manikandan580. It occurs in the /studentms/admin/contact-us.php file where the POST parameter "pagedes" is reflected inside a <textarea> HTML element without proper output encoding.
Because the application does not encode user input properly (e.g., using htmlspecialchars()), an attacker can inject a payload that prematurely closes the <textarea> tag and inserts arbitrary JavaScript code. This injected script then executes in the administrator's browser, a technique known as a "textarea breakout" XSS.
- Vulnerability Type: Reflected Cross-Site Scripting (XSS), specifically a textarea breakout (CWE-79).
- Attack Vector: Remote, no authentication required to inject the payload, but admin interaction is needed for full exploitation.
- Root Cause: Unsafe reflection of user input inside a <textarea> without encoding, allowing injection of </textarea><script>...</script> to break out and execute scripts.
How can this vulnerability impact me? :
This vulnerability can have serious impacts because it allows an attacker to execute arbitrary JavaScript code in the administrator's browser.
- High confidentiality risk: An attacker can steal admin session cookies and tokens, potentially hijacking the admin session.
- High integrity risk: The attacker can perform arbitrary administrative actions by executing scripts with admin privileges.
- Medium availability risk: The attacker can manipulate the user interface or force admin logouts, disrupting normal operations.
Overall, successful exploitation can lead to full administrative control over the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by sending crafted POST requests to the /studentms/admin/contact-us.php endpoint with malicious payloads in the pagedes parameter and observing if the payload is reflected unencoded inside the <textarea> element.
A common detection method is to test for reflected XSS by injecting a payload such as:</p><textarea></textarea><script>alert(1)</script>
Example command using curl to test the vulnerability:
- curl -X POST -d "pagedes=</textarea><script>alert('XSS')</script>" https://target-domain/studentms/admin/contact-us.php -v
If the response contains the injected script tag executed or reflected without encoding, the vulnerability exists.
Additionally, monitoring HTTP traffic for unencoded reflection of POST parameters in responses, especially inside <textarea> elements, can help detect this issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Apply proper output encoding on the pagedes parameter before rendering it inside the <textarea> element using functions like htmlspecialchars($pagedes, ENT_QUOTES, 'UTF-8').
- Sanitize input by stripping all HTML tags or using a whitelist approach to prevent injection of malicious scripts.
- Implement a strict Content Security Policy (CSP), for example, script-src 'self', to block execution of inline scripts.
- Harden admin session cookies by setting HttpOnly and SameSite flags to reduce the risk of cookie theft.
- Avoid reflecting raw POST data directly in server responses without validation or encoding.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The reflected XSS vulnerability in the School Management System 1.0 can lead to high confidentiality risks such as exfiltration of administrator session cookies and tokens. This exposure of sensitive information could potentially result in unauthorized access to personal data managed by the system.
Such unauthorized access and data exposure may impact compliance with data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized disclosure and ensuring data integrity.
Therefore, this vulnerability poses a risk to meeting the confidentiality and integrity requirements mandated by these common standards and regulations.