Vulnerability Description
A cross-site scripting (XSS) vulnerability exists in the Blood Bank Management System 1.0 within the updateprofile.php and rprofile.php components. The application fails to properly sanitize or encode user-supplied input before rendering it in response. An attacker can inject malicious JavaScript payloads into the rname, remail, rpassword, rphone, rcity parameters, which are then executed in the victim's browser when the page is viewed.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shridharshukl | Blood Bank Management System | 1.0 |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/12yeOXW_sN69QjsQtW0_k9AGqozi1s0di/view?usp=shariBroken Link
- https://github.com/Shridharshukl/Blood-Bank-Management-SystemProduct
- https://github.com/kiwi865/CVEs/blob/main/CVE-2025-63533.mdThird Party Advisory
FAQ
What is CVE-2025-63533?
CVE-2025-63533 is a vulnerability with a CVSS score of 8.5 (HIGH). A cross-site scripting (XSS) vulnerability exists in the Blood Bank Management System 1.0 within the updateprofile.php and rprofile.php components. The application fails to properly sanitize or encode...
How severe is CVE-2025-63533?
CVE-2025-63533 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-63533?
Check the references section above for vendor advisories and patch information. Affected products include: Shridharshukl Blood Bank Management System.