A Reflected Cross-Site Scripting (XSS) vulnerability was identified in the application's search functionality. The application reflects user input back to the browser without proper sanitization or output encoding. This allows an attacker to execute arbitrary JavaScript in the context of the victim's session.
The attack utilized an image tag with an invalid source to trigger the onerror event:
<img src=x onerror="alert('XSS')">
Severity: High
The vulnerability occurs because the application takes the query parameter q from the URL and inserts it directly into the HTML DOM (specifically in the "Search Results" header) without escaping special characters. The browser interprets the unescaped <img...> string as executable code rather than plain text.
< to <).