CVE-2024-13080: Cross Site Scripting in PHPGurukul Land Record System
A vulnerability was found in PHPGurukul Land Record System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/aboutus.php. The manipulation of the argument Page Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2024-13080 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Land Record System, specifically within the /admin/aboutus.php file. The vulnerability arises due to improper sanitization or validation of the 'Page Description' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser when they access the vulnerable page. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:P), meaning an attacker must trick a user into visiting a crafted URL or page. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate impact on confidentiality and integrity, with no direct impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability affects only version 1.0 of the PHPGurukul Land Record System, a specialized application used for managing land records, likely deployed in administrative or governmental environments. Although no public exploits are currently known in the wild, the disclosure of the vulnerability and the availability of exploit details increase the risk of exploitation. The vulnerability could be leveraged for session hijacking, defacement, or phishing attacks within the administrative interface, potentially leading to unauthorized access or manipulation of sensitive land record data. Given the administrative context, successful exploitation could undermine data integrity and user trust, and facilitate further attacks within the affected network environment.
Potential Impact
For European organizations, particularly governmental agencies or municipal bodies responsible for land registry and property management, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in administrative portals, enabling attackers to steal session tokens, perform actions on behalf of legitimate users, or deliver malicious payloads to administrators. This could result in unauthorized data manipulation, disclosure of sensitive land ownership information, or disruption of administrative processes. The impact is heightened in organizations where the Land Record System is integrated with other critical infrastructure or databases, potentially allowing lateral movement or privilege escalation. Additionally, reputational damage and loss of public trust could arise from data integrity issues or public exposure of sensitive land records. However, the requirement for user interaction and the medium CVSS score suggest that the threat is significant but not critical, and exploitation would likely require targeted social engineering or phishing campaigns.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of the PHPGurukul Land Record System is recommended once available. In the absence of an official patch, apply input validation and output encoding on the 'Page Description' parameter to neutralize malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Harden administrative access by enforcing multi-factor authentication (MFA) and restricting access to trusted IP ranges or VPNs to reduce exposure. 4. Conduct regular security awareness training for administrative users to recognize and avoid phishing attempts that could trigger XSS exploitation. 5. Monitor web server logs and application behavior for anomalous requests targeting the vulnerable parameter, enabling early detection of exploitation attempts. 6. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the 'Page Description' parameter. 7. Review and sanitize all user-supplied inputs throughout the application to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Austria
CVE-2024-13080: Cross Site Scripting in PHPGurukul Land Record System
Description
A vulnerability was found in PHPGurukul Land Record System 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/aboutus.php. The manipulation of the argument Page Description leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2024-13080 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Land Record System, specifically within the /admin/aboutus.php file. The vulnerability arises due to improper sanitization or validation of the 'Page Description' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser when they access the vulnerable page. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:P), meaning an attacker must trick a user into visiting a crafted URL or page. The CVSS 4.0 base score is 5.1 (medium severity), reflecting the moderate impact on confidentiality and integrity, with no direct impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:N). The vulnerability affects only version 1.0 of the PHPGurukul Land Record System, a specialized application used for managing land records, likely deployed in administrative or governmental environments. Although no public exploits are currently known in the wild, the disclosure of the vulnerability and the availability of exploit details increase the risk of exploitation. The vulnerability could be leveraged for session hijacking, defacement, or phishing attacks within the administrative interface, potentially leading to unauthorized access or manipulation of sensitive land record data. Given the administrative context, successful exploitation could undermine data integrity and user trust, and facilitate further attacks within the affected network environment.
Potential Impact
For European organizations, particularly governmental agencies or municipal bodies responsible for land registry and property management, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in administrative portals, enabling attackers to steal session tokens, perform actions on behalf of legitimate users, or deliver malicious payloads to administrators. This could result in unauthorized data manipulation, disclosure of sensitive land ownership information, or disruption of administrative processes. The impact is heightened in organizations where the Land Record System is integrated with other critical infrastructure or databases, potentially allowing lateral movement or privilege escalation. Additionally, reputational damage and loss of public trust could arise from data integrity issues or public exposure of sensitive land records. However, the requirement for user interaction and the medium CVSS score suggest that the threat is significant but not critical, and exploitation would likely require targeted social engineering or phishing campaigns.
Mitigation Recommendations
1. Immediate patching or upgrading to a fixed version of the PHPGurukul Land Record System is recommended once available. In the absence of an official patch, apply input validation and output encoding on the 'Page Description' parameter to neutralize malicious scripts. 2. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the application context. 3. Harden administrative access by enforcing multi-factor authentication (MFA) and restricting access to trusted IP ranges or VPNs to reduce exposure. 4. Conduct regular security awareness training for administrative users to recognize and avoid phishing attempts that could trigger XSS exploitation. 5. Monitor web server logs and application behavior for anomalous requests targeting the vulnerable parameter, enabling early detection of exploitation attempts. 6. Employ web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting the 'Page Description' parameter. 7. Review and sanitize all user-supplied inputs throughout the application to prevent similar vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-12-31T08:57:54.859Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbed988
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 6/25/2025, 11:31:48 AM
Last updated: 8/1/2025, 11:28:48 AM
Views: 11
Related Threats
CVE-2025-33100: CWE-798 Use of Hard-coded Credentials in IBM Concert Software
MediumCVE-2025-33090: CWE-1333 Inefficient Regular Expression Complexity in IBM Concert Software
HighCVE-2025-27909: CWE-942 Permissive Cross-domain Policy with Untrusted Domains in IBM Concert Software
MediumCVE-2025-1759: CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') in IBM Concert Software
MediumCVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.