parameters via POST at the endpoint '/ofrs/admin/edit-team.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal its cookie session details.
Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2025-28896 | Stored Cross Site Scripting in Online Fire Reporting System v1.2 by PHPGurukul, that consists in a reflected and stored authenticated XSS due to the lack of propper validation of user inputs 'tname' parameter via GET and, 'teamleadname', 'teammember' and 'teamname' parameters via POST at the endpoint '/ofrs/admin/edit-team.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal its cookie session details. | 
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Sep 2025 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:phpgurukul:online_fire_reporting_system:1.2:*:*:*:*:*:*:* | |
| Metrics | 
        
        cvssV3_1
         
  | 
Fri, 12 Sep 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Phpgurukul
         Phpgurukul online Fire Reporting System  | 
|
| Vendors & Products | 
        
        Phpgurukul
         Phpgurukul online Fire Reporting System  | 
Thu, 11 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 11 Sep 2025 12:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Stored Cross Site Scripting in Online Fire Reporting System v1.2 by PHPGurukul, that consists in a stored authenticated XSS due to the lack of propper validation of user inputs 'tname' parameter via GET and, 'teamleadname', 'teammember' and 'teamname' parameters via POST at the endpoint '/ofrs/admin/edit-team.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal its cookie session details. | Stored Cross Site Scripting in Online Fire Reporting System v1.2 by PHPGurukul, that consists in a reflected and stored authenticated XSS due to the lack of propper validation of user inputs 'tname' parameter via GET and, 'teamleadname', 'teammember' and 'teamname' parameters via POST at the endpoint '/ofrs/admin/edit-team.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal its cookie session details. | 
Thu, 11 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Stored Cross Site Scripting in Online Fire Reporting System v1.2 by PHPGurukul, that consists in a stored authenticated XSS due to the lack of propper validation of user inputs 'tname' parameter via GET and, 'teamleadname', 'teammember' and 'teamname' parameters via POST at the endpoint '/ofrs/admin/edit-team.php'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal its cookie session details. | |
| Title | Cross Site Scripting in PHPGurukul Online Fire Reporting System | |
| Weaknesses | CWE-79 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-09-11T14:35:14.678Z
Reserved: 2025-04-16T08:38:17.112Z
Link: CVE-2025-40693
Updated: 2025-09-11T13:27:45.449Z
Status : Analyzed
Published: 2025-09-11T12:15:35.653
Modified: 2025-09-12T15:31:37.410
Link: CVE-2025-40693
No data.
                        OpenCVE Enrichment
                    Updated: 2025-09-12T08:02:57Z
 EUVD