Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40484: n/a

0
Medium
VulnerabilityCVE-2024-40484cvecve-2024-40484
Published: Thu Aug 08 2024 (08/08/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A Reflected Cross Site Scripting (XSS) vulnerability was found in "/oahms/search.php" in PHPGurukul Old Age Home Management System v1.0, which allows remote attackers to execute arbitrary code via the "searchdata" parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:22:25 UTC

Technical Analysis

CVE-2024-40484 is a reflected Cross Site Scripting (XSS) vulnerability identified in the PHPGurukul Old Age Home Management System version 1.0. The vulnerability exists in the /oahms/search.php script, specifically through the 'searchdata' parameter, which fails to properly sanitize user input before reflecting it back in the HTTP response. This allows a remote attacker to craft a malicious URL containing executable JavaScript code that, when visited by a user, executes in the victim's browser context. The attack does not require any authentication but does require the victim to click or visit the malicious link, making it a user-interaction-based attack. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS 3.1 score of 6.1 indicates a medium severity level, with the vector showing network attack vector, low attack complexity, no privileges required, user interaction required, and a scope change. The impact affects confidentiality and integrity to a limited extent but does not affect availability. No patches or known exploits have been reported at the time of publication, which means organizations must rely on mitigations until an official fix is released. The reflected XSS can be leveraged for session hijacking, phishing, or delivering malicious payloads to users of the affected system.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user confidentiality and integrity through the execution of arbitrary scripts in the victim's browser. Attackers can steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites. Although availability is not affected, the trustworthiness of the affected application is undermined. Organizations using the PHPGurukul Old Age Home Management System may face reputational damage, data leakage, and potential regulatory compliance issues if user data is compromised. Since the vulnerability requires user interaction, the attack surface is somewhat limited, but phishing campaigns or social engineering can increase exploitation likelihood. The lack of patches means the risk remains until mitigations or updates are applied. Given the niche nature of the software, the global impact is limited but significant for affected entities managing sensitive elderly care data.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict input validation and output encoding on the 'searchdata' parameter to neutralize any injected scripts. Employing Content Security Policy (CSP) headers can reduce the impact of XSS by restricting script execution sources. Web Application Firewalls (WAFs) can be configured to detect and block suspicious input patterns targeting the vulnerable parameter. User education on phishing and suspicious links can reduce the risk of user interaction with malicious URLs. Until an official patch is released by PHPGurukul, administrators should consider disabling or restricting access to the vulnerable search functionality if feasible. Regular security assessments and code reviews should be conducted to identify and remediate similar vulnerabilities. Monitoring logs for unusual request patterns targeting /oahms/search.php can help detect exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cabb7ef31ef0b567e71

Added to database: 2/25/2026, 9:42:03 PM

Last enriched: 2/28/2026, 5:22:25 AM

Last updated: 4/11/2026, 4:59:18 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses