Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40481: n/a

0
Medium
VulnerabilityCVE-2024-40481cvecve-2024-40481
Published: Thu Aug 08 2024 (08/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A Stored Cross Site Scripting (XSS) vulnerability was found in "/admin/view-enquiry.php" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the Contact Us page "message" parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:21:57 UTC

Technical Analysis

CVE-2024-40481 is a stored Cross Site Scripting (XSS) vulnerability identified in the PHPGurukul Old Age Home Management System version 1.0. The vulnerability exists in the /admin/view-enquiry.php endpoint, where the 'message' parameter from the Contact Us page is not properly sanitized or encoded before being stored and subsequently rendered in the administrative interface. This flaw allows an unauthenticated remote attacker to inject malicious JavaScript code that is persistently stored on the server and executed in the context of an administrator's browser when they view the enquiry messages. The vulnerability leverages the classic CWE-79 weakness, which is a failure to neutralize or encode output properly. The CVSS 3.1 base score of 6.1 reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). The lack of availability impact and the medium complexity of exploitation contribute to the medium severity rating. No patches or official fixes have been released at the time of publication, and no known exploits have been observed in the wild. This vulnerability could be exploited to steal administrator session cookies, perform actions on behalf of the admin, or deliver further payloads, potentially compromising the management system and sensitive data related to elderly care facilities.

Potential Impact

The impact of CVE-2024-40481 on organizations using the PHPGurukul Old Age Home Management System can be significant, especially considering the sensitive nature of data managed by elder care facilities. Successful exploitation could lead to unauthorized access to administrative accounts via session hijacking, enabling attackers to manipulate or exfiltrate sensitive personal and health-related information. The integrity of the system could be compromised by injecting malicious content or commands, potentially disrupting operations or damaging trust. Although availability is not directly affected, the indirect consequences of data breaches or administrative account compromise could lead to operational downtime or regulatory penalties. Given the vulnerability requires user interaction (an admin viewing the malicious message), social engineering or phishing tactics might be used to increase exploitation success. Globally, elder care facilities and healthcare organizations using this system are at risk of reputational damage, legal consequences, and financial loss if the vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-40481, organizations should implement strict input validation and output encoding on all user-supplied data, especially the 'message' parameter on the Contact Us page. Employing context-aware output encoding (e.g., HTML entity encoding) before rendering data in the admin interface is critical to prevent script execution. Web application firewalls (WAFs) can provide an additional layer of defense by detecting and blocking malicious payloads targeting XSS vulnerabilities. Administrators should be trained to recognize suspicious input and avoid interacting with untrusted content. Regular security assessments and code reviews focusing on input handling should be conducted. If possible, restrict access to the /admin/view-enquiry.php page to trusted IP addresses or VPN users to reduce exposure. Monitoring logs for unusual activity and implementing Content Security Policy (CSP) headers can further reduce the risk of exploitation. Finally, contacting the software vendor for patches or updates and applying them promptly once available is essential.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cabb7ef31ef0b567e65

Added to database: 2/25/2026, 9:42:03 PM

Last enriched: 2/28/2026, 5:21:57 AM

Last updated: 4/12/2026, 9:29:58 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses