Description
A vulnerability has been found in PHPGurukul Company Visitor Management System 2.0. This impacts an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-13
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The vulnerability exists in the bwdates‑reports‑details.php file of PHPGurukul Company Visitor Management System 2.0. An attacker can craft a request that manipulates the fromdate argument to inject unencoded HTML or JavaScript. When the victim’s browser processes the response, the injected script executes with the privileges of the page, potentially allowing session hijacking, defacement, or the theft of sensitive data within the browser. This flaw is a classic reflected XSS issue (CWE‑79).

Affected Systems

PHPGurukul: Company Visitor Management System version 2.0 is the only product listed as affected. The exploit targets the bwdates‑reports‑details.php endpoint, and no other vendors or versions are indicated in the provided data.

Risk and Exploitability

The CVSS score of 5.1 denotes moderate severity. No EPSS data is available, and the vulnerability is not included in the CISA KEV catalog. The flaw can be exploited remotely by any attacker able to send a crafted HTTP request containing a malicious fromdate value. Authentication or privileged access is not required. The impact is confined to the client side, potentially compromising user sessions or data in the browser, but does not afford direct server‑side control.

Generated by OpenCVE AI on April 13, 2026 at 06:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to the latest release of PHPGurukul Company Visitor Management System that fixes the XSS flaw.
  • If a patch is not yet available, sanitize or encode all user‑supplied input for the fromdate parameter on bwdates‑reports‑details.php before rendering.
  • Deploy a Content‑Security‑Policy header or a web application firewall to block the execution of injected scripts.
  • Monitor web server logs for suspicious requests that include injected scripts in the fromdate parameter and investigate any anomalies promptly.

Generated by OpenCVE AI on April 13, 2026 at 06:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in PHPGurukul Company Visitor Management System 2.0. This impacts an unknown function of the file /bwdates-reports-details.php. The manipulation of the argument fromdate leads to cross site scripting. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.
Title PHPGurukul Company Visitor Management System bwdates-reports-details.php cross site scripting
First Time appeared Phpgurukul
Phpgurukul company Visitor Management System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:phpgurukul:company_visitor_management_system:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul company Visitor Management System
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Company Visitor Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T11:28:25.916Z

Reserved: 2026-04-12T20:37:41.868Z

Link: CVE-2026-6162

cve-icon Vulnrichment

Updated: 2026-04-13T11:24:51.865Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T05:16:05.837

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-6162

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:01Z

Weaknesses