Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-51328: n/a

0
Medium
VulnerabilityCVE-2023-51328cvecve-2023-51328
Published: Thu May 08 2025 (05/08/2025, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

PHPJabbers Cleaning Business Software v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "c_name, name" parameters.

AI-Powered Analysis

AILast updated: 11/04/2025, 19:22:58 UTC

Technical Analysis

CVE-2023-51328 identifies multiple stored Cross-Site Scripting (XSS) vulnerabilities in PHPJabbers Cleaning Business Software version 1.0, specifically in the parameters 'c_name' and 'name'. Stored XSS occurs when malicious scripts injected by an attacker are permanently stored on the target server and executed in the context of other users' browsers when they access the affected pages. This vulnerability allows an authenticated user with low privileges to inject JavaScript code that can execute in the browsers of other users who view the affected data fields. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) indicates network attack vector, low attack complexity, requiring privileges and user interaction, with a scope change and limited confidentiality and integrity impact but no availability impact. The vulnerability is classified under CWE-79, which is a common and well-understood web security issue. Although no public exploits are known and no patches have been released, the vulnerability poses a risk of session hijacking, credential theft, or unauthorized actions performed on behalf of users. The lack of vendor project and product details beyond the software name suggests limited public information, but the presence of this vulnerability in a business software product used for cleaning service management could affect organizations relying on this software for client and operational data management.

Potential Impact

For European organizations using PHPJabbers Cleaning Business Software v1.0, this vulnerability can lead to unauthorized access to sensitive information such as user sessions, personal data, or business-critical information through the execution of malicious scripts. Attackers could leverage the stored XSS to perform actions on behalf of legitimate users, potentially leading to data manipulation or theft. Although the impact on availability is negligible, the compromise of confidentiality and integrity can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR), and cause operational disruptions. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments with many users or weak access controls. Organizations in sectors with high reliance on cleaning service management software, including facility management and property services, may face increased risk. Additionally, the persistent nature of stored XSS means that once exploited, the malicious payload can affect multiple users over time until remediated.

Mitigation Recommendations

To mitigate CVE-2023-51328, organizations should implement strict input validation and sanitization on the 'c_name' and 'name' parameters to prevent injection of malicious scripts. Employing context-aware output encoding when displaying user-supplied data is critical to neutralize any injected scripts. Restricting user privileges to the minimum necessary reduces the risk of exploitation by limiting who can inject malicious content. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly audit and monitor logs for unusual activities related to these parameters. Since no official patches are currently available, consider applying virtual patching via Web Application Firewalls (WAF) to detect and block malicious payloads targeting these parameters. Educate users about the risks of interacting with suspicious content and enforce multi-factor authentication to reduce the impact of session hijacking. Finally, maintain an inventory of affected software versions and plan for timely updates once patches are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2023-12-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7109

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 11/4/2025, 7:22:58 PM

Last updated: 11/22/2025, 4:45:58 PM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats