Description
Multiple cross-site scripting (XSS) vulnerabilities in the component /admin/edit-vehicle.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum and enginenumber parameters.
Published: 2026-03-23
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

Multiple cross‑site scripting (XSS) vulnerabilities exist in the /admin/edit‑vehicle.php component of Phpgurukul Vehicle Record Management System version 1.0. Attackers can inject crafted payloads into the vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum and enginenumber parameters to execute arbitrary web scripts or HTML. This enables malicious actors to run arbitrary client‑side code within the context of the application, potentially leading to data theft, credential compromise or defacement.

Affected Systems

The vulnerability affects Phpgurukul Vehicle Record Management System at version 1.0, as identified by the component path and CPE string. No other versions or products are explicitly mentioned, so the impact is limited to installations running that exact version.

Risk and Exploitability

With a CVSS score of 4.8, the vulnerability is classified as medium severity. The EPSS score of below 1 % indicates a low likelihood of widespread exploitation, and the issue is not listed in the CISA KEV catalog. The vulnerability is likely exploitable by submitting crafted HTTP requests to the protected /admin interface, typically requiring authenticated access or at least access to the edit‑vehicle page. Attackers can leverage the unescaped input fields to inject malicious scripts that run in end‑user browsers.

Generated by OpenCVE AI on March 24, 2026 at 19:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an updated version of the Phpgurukul Vehicle Record Management System that fixes the XSS issue and apply the update.
  • If no update is available, implement server‑side validation and output encoding for the vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum and enginenumber parameters to prevent XSS.
  • Deploy a Content Security Policy that restricts script execution to trusted sources.
  • Monitor administrative activity logs for suspicious input patterns and investigate anomalies.

Generated by OpenCVE AI on March 24, 2026 at 19:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Title Cross‑Site Scripting in Vehicle Record Management System v1.0

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:vehicle_record_management_system:1.0:*:*:*:*:*:*:*

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul vehicle Record Management System
Vendors & Products Phpgurukul
Phpgurukul vehicle Record Management System

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description Multiple cross-site scripting (XSS) vulnerabilities in the component /admin/edit-vehicle.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum and enginenumber parameters.
References

Subscriptions

Phpgurukul Vehicle Record Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T16:52:09.544Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51224

cve-icon Vulnrichment

Updated: 2026-03-23T16:51:30.611Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T16:16:31.710

Modified: 2026-03-24T18:13:31.527

Link: CVE-2024-51224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:15Z

Weaknesses