Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51305: n/a

0
Medium
VulnerabilityCVE-2023-51305cvecve-2023-51305
Published: Wed Feb 19 2025 (02/19/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key" parameters.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:17:16 UTC

Technical Analysis

CVE-2023-51305 identifies multiple stored Cross-Site Scripting (XSS) vulnerabilities in PHPJabbers Car Park Booking System version 3.0. The affected parameters include 'name', 'plugin_sms_api_key', 'plugin_sms_country_code', and 'title', which do not properly sanitize user input before storing it. Stored XSS occurs when malicious scripts are saved on the server and later rendered in users' browsers, enabling attackers to execute arbitrary JavaScript in the context of the vulnerable application. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of legitimate users. The vulnerability requires an attacker to have at least some level of authenticated access (PR:L) and user interaction (UI:R) to exploit, which limits but does not eliminate risk. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, privileges required, user interaction needed, scope changed, and low impact on confidentiality and integrity, with no impact on availability. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is categorized under CWE-79, a common and well-understood web application security issue. Organizations using this booking system should prioritize input validation and access controls to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of data managed by the PHPJabbers Car Park Booking System. Attackers exploiting stored XSS can hijack user sessions, steal credentials, or manipulate booking data, potentially disrupting business operations and damaging reputation. Since the vulnerability requires authenticated access, insider threats or compromised accounts increase risk. The scope change in the CVSS vector suggests that exploitation could affect resources beyond the initially vulnerable component, potentially impacting multiple users. Although availability is not affected, the indirect consequences of data breaches or unauthorized actions could lead to operational disruptions. European entities managing parking infrastructure, event venues, or transportation hubs using this system may face targeted attacks, especially if attackers aim to disrupt services or gain footholds for further network intrusion. Compliance with GDPR also means that data breaches resulting from such vulnerabilities could lead to regulatory penalties and loss of customer trust.

Mitigation Recommendations

1. Monitor PHPJabbers official channels for security updates and apply patches promptly once available. 2. Implement strict input validation and sanitization on all user-supplied data, especially for the affected parameters ('name', 'plugin_sms_api_key', 'plugin_sms_country_code', 'title'). Use context-aware encoding to prevent script injection. 3. Restrict access to the booking system's administrative and configuration interfaces to trusted personnel only, employing strong authentication mechanisms such as multi-factor authentication (MFA). 4. Conduct regular security audits and penetration testing focusing on web application vulnerabilities, including stored XSS. 5. Deploy Web Application Firewalls (WAF) with rules tuned to detect and block XSS payloads targeting the affected parameters. 6. Educate users and administrators about phishing and social engineering risks that could facilitate exploitation. 7. Monitor logs and user activities for unusual behavior indicative of exploitation attempts. 8. Consider isolating the booking system within a segmented network zone to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a47406d939959c8021f7d

Added to database: 11/4/2025, 6:34:40 PM

Last enriched: 11/4/2025, 7:17:16 PM

Last updated: 11/5/2025, 2:12:51 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats