Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51222: n/a

0
Medium
VulnerabilityCVE-2024-51222cvecve-2024-51222
Published: Mon Mar 23 2026 (03/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A stored cross-site scripting (XSS) vulnerability in the component /admin/profile.php of Phpgurukul Vehicle Record Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 16:03:05 UTC

Technical Analysis

CVE-2024-51222 identifies a stored cross-site scripting (XSS) vulnerability in the Phpgurukul Vehicle Record Management System version 1.0, specifically within the /admin/profile.php component. Stored XSS occurs when malicious input is saved by the application and later rendered in a web page without proper sanitization or encoding, allowing attackers to execute arbitrary JavaScript or HTML code in the victim's browser. In this case, the vulnerability arises from improper handling of the Name parameter, which accepts crafted payloads that get stored and executed when viewed by users with access to the admin profile page. This flaw can be exploited by attackers to hijack user sessions, deface web content, redirect users to malicious sites, or perform unauthorized actions under the context of the victim's privileges. The vulnerability does not require prior authentication to inject the payload, but exploitation typically targets authenticated users who access the affected page. No patches or fixes are currently linked, and no known exploits have been observed in the wild, indicating either recent discovery or limited exposure. The absence of a CVSS score necessitates an assessment based on the vulnerability's characteristics: stored XSS is generally high risk due to persistent code execution and potential for significant impact on confidentiality and integrity. The vulnerability affects a niche vehicle record management system, which may limit its widespread impact but poses serious risks to organizations relying on this software for administrative vehicle data management.

Potential Impact

The primary impact of CVE-2024-51222 is the compromise of confidentiality and integrity through the execution of arbitrary scripts in the context of the vulnerable web application. Attackers can steal session cookies, enabling account takeover, or manipulate displayed content to mislead users or conduct phishing attacks. The stored nature of the XSS means the malicious payload persists, affecting all users who view the compromised profile page, potentially including high-privilege administrators. This can lead to unauthorized access, data leakage, and manipulation of vehicle records or administrative functions. The vulnerability could also be leveraged as a foothold for further attacks within the network, such as privilege escalation or lateral movement. While availability impact is less direct, successful exploitation could disrupt administrative operations or cause reputational damage. Organizations using this system without mitigation expose themselves to targeted attacks, especially if the system is internet-facing or accessible by multiple users.

Mitigation Recommendations

To mitigate CVE-2024-51222, organizations should implement strict input validation and output encoding on the Name parameter and all user-supplied inputs to prevent injection of malicious scripts. Employing a whitelist approach for acceptable characters and length restrictions can reduce risk. Use security libraries or frameworks that automatically handle encoding and sanitization. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Regularly audit and sanitize existing stored data to remove any malicious payloads. Restrict access to the /admin/profile.php page to trusted users and consider multi-factor authentication to reduce risk of session hijacking. Monitor logs for suspicious input patterns or unusual activity. If a patch becomes available from the vendor, apply it promptly. Additionally, conduct security awareness training for administrators to recognize and report suspicious behaviors. Network segmentation and web application firewalls (WAFs) can provide additional layers of defense by detecting and blocking XSS payloads.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-10-28T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c16032f4197a8e3b6f2bf4

Added to database: 3/23/2026, 3:45:54 PM

Last enriched: 3/23/2026, 4:03:05 PM

Last updated: 3/24/2026, 5:19:46 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses