leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.","datePublished":"2023-11-26T22:31:04.240Z","dateModified":"2025-07-29T22:12:17.589Z","url":"https://radar.offseq.com/threat/cve-2023-6297-cwe-79-cross-site-scripting-in-phpgu-0f75a1e8","author":{"@type":"Organization","name":"OffSeq Threat Intelligence","url":"https://radar.offseq.com"},"publisher":{"@type":"Organization","name":"OffSeq","logo":{"@type":"ImageObject","url":"https://radar.offseq.com/favicon.png"}},"mainEntityOfPage":{"@type":"WebPage","@id":"https://radar.offseq.com/threat/cve-2023-6297-cwe-79-cross-site-scripting-in-phpgu-0f75a1e8"},"identifier":"CVE-2023-6297","contentRating":"MEDIUM","keywords":"cve,cve-2023-6297,cwe-79"}
Skip to main content

CVE-2023-6297: CWE-79 Cross Site Scripting in PHPGurukul Nipah Virus Testing Management System

Medium
VulnerabilityCVE-2023-6297cvecve-2023-6297cwe-79
Published: Sun Nov 26 2023 (11/26/2023, 22:31:04 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Nipah Virus Testing Management System

Description

A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:25:14 UTC

Technical Analysis

CVE-2023-6297 is a medium-severity Cross Site Scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Nipah Virus Testing Management System, specifically within the patient-search-report.php file's Search Report Page component. The vulnerability arises from improper sanitization of user input in the 'Search By Patient Name' parameter, allowing an attacker to inject malicious JavaScript code, such as <script>alert(document.cookie)</script>. This input is then reflected back in the web page without adequate encoding or validation, enabling remote attackers to execute arbitrary scripts in the context of the victim's browser session. The vulnerability does not require authentication but does require user interaction, as the victim must visit a crafted URL or interact with the vulnerable interface. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the lack of impact on confidentiality and availability, but with a potential integrity impact through script injection. Although no known exploits are currently reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability is classified under CWE-79, which is a common web application security issue related to improper output encoding leading to XSS attacks. Given the nature of the affected system—a specialized management system for Nipah Virus testing—this vulnerability could be leveraged to conduct phishing, session hijacking, or deliver malicious payloads to healthcare personnel or patients using the system.

Potential Impact

For European organizations, particularly healthcare providers and public health authorities using the PHPGurukul Nipah Virus Testing Management System, this vulnerability poses a risk to the integrity of their web applications and the security of user sessions. Exploitation could lead to unauthorized script execution, potentially allowing attackers to steal session cookies, perform actions on behalf of legitimate users, or deliver malware. While the vulnerability does not directly compromise confidentiality or availability, the indirect effects—such as loss of trust, disruption of healthcare workflows, or exposure of sensitive patient data through session hijacking—can be significant. Given the critical nature of healthcare services and the sensitivity of patient data in Europe, even medium-severity vulnerabilities in healthcare management systems warrant prompt attention. Additionally, the public disclosure of the vulnerability increases the likelihood of opportunistic attacks targeting less-secure deployments within European healthcare infrastructure.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately implement input validation and output encoding on the 'Search By Patient Name' parameter in the patient-search-report.php page. Specifically, all user-supplied input should be sanitized to remove or neutralize HTML and JavaScript code before rendering it in the web interface. Employing context-aware output encoding (e.g., HTML entity encoding) is critical to prevent script injection. Organizations should also consider implementing Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Regularly updating or patching the PHPGurukul Nipah Virus Testing Management System to a version that addresses this vulnerability is recommended once available. In the absence of an official patch, applying web application firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter can provide interim protection. Additionally, user awareness training to recognize phishing attempts and suspicious links can reduce the risk of successful exploitation. Finally, monitoring web server logs for unusual input patterns or repeated attempts to inject scripts can help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-11-26T07:21:11.672Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f034a182aa0cae27e6632

Added to database: 6/3/2025, 2:14:34 PM

Last enriched: 7/4/2025, 4:25:14 PM

Last updated: 7/29/2025, 10:12:17 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats