Description
A stored cross-site scripting (XSS) vulnerability in the component /admin/add-brand.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the brandname parameter.
Published: 2026-03-23
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that can execute arbitrary JavaScript in the victim's browser, enabling session hijacking, data theft, or defacement.
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw in the /admin/add-brand.php page of the Vehicle Record Management System. An attacker can embed JavaScript or HTML into the brandname field; when an administrator submits the value, it is stored without proper escaping and subsequently rendered to users. This flaw allows arbitrary script execution within any victim's browser session that views the affected page, potentially leading to session hijacking, credential theft, or defacement of the website.

Affected Systems

The affected product is the Phpgurukul Vehicle Record Management System, version 1.0. No other vendors or products are identified. The flaw exists only in this specific version unless newer releases address the issue.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate risk level, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires access to the admin interface, implying that an attacker must be authenticated as an administrator or already possess a valid admin session. Once that condition is met, the attacker can inject malicious payloads into the brandname field, which are stored and later served to any user who views the brand record. The primary attack vector is a web-based form that accepts user-supplied data without proper sanitization.

Generated by OpenCVE AI on March 24, 2026 at 19:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-provided patch or upgrade to the latest version of Vehicle Record Management System.
  • Restrict access to /admin/add-brand.php to users with verified administrative rights and enforce strong authentication.
  • Sanitize or escape all user input before storing or rendering the brandname value to prevent script execution.
  • Implement a strict Content Security Policy that disallows inline scripts and limits script sources.
  • Monitor the application logs for anomalous JavaScript injection and conduct regular security testing.

Generated by OpenCVE AI on March 24, 2026 at 19:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Title Stored XSS in Phpgurukul Vehicle Record Management System v1.0

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:phpgurukul:vehicle_record_management_system:1.0:*:*:*:*:*:*:*

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Phpgurukul
Phpgurukul vehicle Record Management System
Vendors & Products Phpgurukul
Phpgurukul vehicle Record Management System

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A stored cross-site scripting (XSS) vulnerability in the component /admin/add-brand.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the brandname parameter.
References

Subscriptions

Phpgurukul Vehicle Record Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-23T16:52:38.428Z

Reserved: 2024-10-28T00:00:00.000Z

Link: CVE-2024-51225

cve-icon Vulnrichment

Updated: 2026-03-23T16:52:27.210Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T16:16:31.823

Modified: 2026-03-24T18:11:26.960

Link: CVE-2024-51225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:14Z

Weaknesses