Description
A stored cross-site scripting (XSS) vulnerability in the component /admin/profile.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Mobile Number parameter.
Published: 2026-03-23
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side XSS
Action: Assess Impact
AI Analysis

Impact

A stored Cross‑Site Scripting flaw resides in the Mobile Number input of the /admin/profile.php page of Phpgurukul Vehicle Record Management System v1.0. By injecting a crafted payload into this field, malicious code can be stored and later served to users who view or edit the profile. The vulnerability allows execution of arbitrary web scripts or HTML in the context of other users, which can lead to session hijacking, defacement, or theft of sensitive data displayed by the application, without granting attacker control over the server itself. This weakness is rooted in improper input handling and output encoding (CWE‑79).

Affected Systems

Phpgurukul Vehicle Record Management System version 1.0 is affected. The flaw is located in the admin profile module accessible at /admin/profile.php. No vendor‑supplied patch or newer release is referenced in the available data.

Risk and Exploitability

The CVSS score of 4.8 places the issue in the medium range, while an EPSS score below 1 % suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, indicating limited public exploitation. Based on the description, it is inferred that attackers would need to reach the /admin/profile.php endpoint and submit a malicious Mobile Number value, implying that authenticated access or the ability to trick a legitimate administrator is likely required. The attack vector is a web form input, requiring moderate effort and possibly user interaction to trigger the malicious payload.

Generated by OpenCVE AI on March 24, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official vendor patch or newer release and apply it immediately
  • Sanitize and validate the Mobile Number input field on the server side to reject non‑numeric or unsafe characters
  • When rendering the Mobile Number value in the browser, apply context‑appropriate output encoding (e.g., HTML or JavaScript encoding) to neutralize any embedded scripts

Generated by OpenCVE AI on March 24, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Title Stored Cross‑Site Scripting in Admin Profile Mobile Number Field

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:vehicle_record_management_system:1.0:*:*:*:*:*:*:*

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul vehicle Record Management System
Vendors & Products Phpgurukul
Phpgurukul vehicle Record Management System

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A stored cross-site scripting (XSS) vulnerability in the component /admin/profile.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Mobile Number parameter.
References

Subscriptions

Phpgurukul Vehicle Record Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T16:50:34.560Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51223

cve-icon Vulnrichment

Updated: 2026-03-23T16:50:26.549Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T16:16:31.597

Modified: 2026-03-24T18:13:43.607

Link: CVE-2024-51223

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:16Z

Weaknesses