Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46335: n/a

0
Medium
VulnerabilityCVE-2024-46335cvecve-2024-46335
Published: Mon Nov 17 2025 (11/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

PHPGurukul Complaint Management System 2.0 is vulnerble to Cross Site Scripting (XSS) via the fromdate and todate parameters in between-date-userreport.php.

AI-Powered Analysis

AILast updated: 11/17/2025, 18:57:22 UTC

Technical Analysis

CVE-2024-46335 is a Cross Site Scripting (XSS) vulnerability identified in PHPGurukul Complaint Management System version 2.0. The vulnerability exists in the between-date-userreport.php script, specifically via the fromdate and todate parameters. These parameters are used to filter reports by date, but they lack proper input validation and output encoding, allowing an attacker to inject malicious JavaScript code. When a victim accesses a crafted URL containing the malicious payload, the script executes in their browser context. This can lead to session hijacking, theft of cookies, defacement of the web interface, or redirection to malicious websites. The vulnerability does not require authentication or user interaction beyond visiting a malicious link, making exploitation relatively straightforward. No patches or fixes are currently published, and no known exploits have been observed in the wild. The absence of a CVSS score indicates the need for an expert assessment, but the technical characteristics suggest a moderate risk. The affected software is a complaint management system used primarily in organizational contexts to handle user complaints and reports, which may contain sensitive information. The vulnerability could be leveraged to compromise user trust and data confidentiality, especially in environments where complaint data is sensitive or regulated. The lack of authentication requirement and the ability to execute arbitrary scripts in users' browsers increase the threat's potential impact. However, the limited scope of affected software and the absence of widespread exploitation reduce the overall criticality at this time.

Potential Impact

For European organizations using PHPGurukul Complaint Management System 2.0, this XSS vulnerability could lead to unauthorized access to user sessions, theft of sensitive complaint data, and potential manipulation or defacement of complaint reports. Confidentiality of user-submitted complaints could be compromised, undermining trust in the complaint handling process. Integrity of reports could be affected if attackers inject misleading or malicious content. Availability is less likely to be impacted directly, but reputational damage and potential regulatory consequences (especially under GDPR) could be significant if personal data is exposed. Public sector organizations and companies handling citizen or customer complaints are particularly at risk, as exploitation could disrupt critical communication channels. The ease of exploitation without authentication means attackers could target a wide range of users, including employees and external complainants. Although no known exploits exist currently, the vulnerability presents a clear risk that could be weaponized in phishing campaigns or targeted attacks. The impact is thus moderate but should not be underestimated given the sensitivity of complaint management systems in organizational workflows.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on the fromdate and todate parameters in the between-date-userreport.php script to prevent injection of malicious scripts. Employing a web application firewall (WAF) with rules to detect and block XSS payloads targeting these parameters can provide immediate protection. Developers should adopt secure coding practices, including the use of established libraries or frameworks that automatically handle input sanitization and output escaping. Until an official patch is released by PHPGurukul, organizations should consider disabling or restricting access to the vulnerable reporting functionality if feasible. Conduct regular security assessments and penetration tests focusing on web application inputs to identify similar vulnerabilities. User education on phishing risks and suspicious links can reduce the likelihood of successful exploitation. Monitoring web server logs for unusual query parameters or repeated attempts to inject scripts can help detect exploitation attempts early. Finally, organizations should stay updated with vendor advisories and apply patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691b6c6ff84694138ddf7098

Added to database: 11/17/2025, 6:41:51 PM

Last enriched: 11/17/2025, 6:57:22 PM

Last updated: 11/18/2025, 7:10:19 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats