CVE-2025-10794: Cross Site Scripting in PHPGurukul Car Rental Project
A flaw has been found in PHPGurukul Car Rental Project 3.0. Affected by this issue is some unknown functionality of the file /carrental/search.php. Executing manipulation of the argument autofocus can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2025-10794 is a cross-site scripting (XSS) vulnerability identified in version 3.0 of the PHPGurukul Car Rental Project, specifically within the /carrental/search.php file. The vulnerability arises from improper handling of the 'autofocus' argument, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser without requiring authentication. The vulnerability is classified as reflected XSS, where the injected script is reflected off the web server in the immediate response to a crafted request. The CVSS 4.0 base score is 5.3 (medium severity), indicating moderate impact with no privileges or user interaction required, and low complexity of attack. The vulnerability does not affect confidentiality directly but can impact integrity and availability by enabling session hijacking, defacement, or redirection to malicious sites. Exploit code has been published, increasing the risk of exploitation, although no confirmed widespread exploitation is reported yet. The vulnerability affects a specific version of a niche web application used for car rental management, which may be deployed by small to medium enterprises or local rental agencies relying on PHPGurukul's software solution.
Potential Impact
For European organizations using the PHPGurukul Car Rental Project 3.0, this vulnerability poses a tangible risk of client-side attacks that could compromise user sessions, steal sensitive data such as login credentials, or perform unauthorized actions on behalf of users. Given the nature of the application, which likely handles customer personal information and booking details, exploitation could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The reflected XSS could also be leveraged as a vector for phishing campaigns targeting customers or employees. While the vulnerability does not directly compromise backend systems, the indirect consequences of client-side compromise can be significant, especially for organizations with a large customer base or those operating in highly regulated sectors. The medium severity score suggests that while the threat is not critical, it should not be ignored, particularly since exploit code is publicly available and the attack can be launched remotely without authentication.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and sanitize all user-controllable inputs, especially the 'autofocus' parameter in /carrental/search.php, using robust server-side input validation and output encoding techniques to neutralize malicious scripts. Implementing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Since no official patch is currently available, organizations should consider applying custom patches or workarounds, such as disabling or restricting the vulnerable functionality if feasible. Regular security testing, including automated scanning and manual code review, should be conducted to detect similar issues. Additionally, educating users about the risks of phishing and suspicious links can reduce the impact of potential attacks leveraging this vulnerability. Monitoring web server logs for unusual requests targeting the autofocus parameter can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-10794: Cross Site Scripting in PHPGurukul Car Rental Project
Description
A flaw has been found in PHPGurukul Car Rental Project 3.0. Affected by this issue is some unknown functionality of the file /carrental/search.php. Executing manipulation of the argument autofocus can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-10794 is a cross-site scripting (XSS) vulnerability identified in version 3.0 of the PHPGurukul Car Rental Project, specifically within the /carrental/search.php file. The vulnerability arises from improper handling of the 'autofocus' argument, which can be manipulated by an attacker to inject malicious scripts. This flaw allows remote attackers to execute arbitrary JavaScript code in the context of the victim's browser without requiring authentication. The vulnerability is classified as reflected XSS, where the injected script is reflected off the web server in the immediate response to a crafted request. The CVSS 4.0 base score is 5.3 (medium severity), indicating moderate impact with no privileges or user interaction required, and low complexity of attack. The vulnerability does not affect confidentiality directly but can impact integrity and availability by enabling session hijacking, defacement, or redirection to malicious sites. Exploit code has been published, increasing the risk of exploitation, although no confirmed widespread exploitation is reported yet. The vulnerability affects a specific version of a niche web application used for car rental management, which may be deployed by small to medium enterprises or local rental agencies relying on PHPGurukul's software solution.
Potential Impact
For European organizations using the PHPGurukul Car Rental Project 3.0, this vulnerability poses a tangible risk of client-side attacks that could compromise user sessions, steal sensitive data such as login credentials, or perform unauthorized actions on behalf of users. Given the nature of the application, which likely handles customer personal information and booking details, exploitation could lead to privacy violations under GDPR, reputational damage, and potential regulatory penalties. The reflected XSS could also be leveraged as a vector for phishing campaigns targeting customers or employees. While the vulnerability does not directly compromise backend systems, the indirect consequences of client-side compromise can be significant, especially for organizations with a large customer base or those operating in highly regulated sectors. The medium severity score suggests that while the threat is not critical, it should not be ignored, particularly since exploit code is publicly available and the attack can be launched remotely without authentication.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately review and sanitize all user-controllable inputs, especially the 'autofocus' parameter in /carrental/search.php, using robust server-side input validation and output encoding techniques to neutralize malicious scripts. Implementing Content Security Policy (CSP) headers can further reduce the risk by restricting the execution of unauthorized scripts. Since no official patch is currently available, organizations should consider applying custom patches or workarounds, such as disabling or restricting the vulnerable functionality if feasible. Regular security testing, including automated scanning and manual code review, should be conducted to detect similar issues. Additionally, educating users about the risks of phishing and suspicious links can reduce the impact of potential attacks leveraging this vulnerability. Monitoring web server logs for unusual requests targeting the autofocus parameter can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-21T09:24:16.084Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68d126e5419b193bae2c43d1
Added to database: 9/22/2025, 10:37:25 AM
Last enriched: 9/22/2025, 10:37:47 AM
Last updated: 9/26/2025, 12:10:46 AM
Views: 21
Related Threats
CVE-2025-9044: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mapster Mapster WP Maps
MediumCVE-2025-11000: NULL Pointer Dereference in Open Babel
MediumCVE-2025-10745: CWE-330 Use of Insufficiently Random Values in specialk Banhammer – Monitor Site Traffic, Block Bad Users and Bots
MediumCVE-2025-10377: CWE-352 Cross-Site Request Forgery (CSRF) in qriouslad System Dashboard
MediumCVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.