CVE-2025-7601: Cross Site Scripting in PHPGurukul Online Library Management System
A vulnerability has been found in PHPGurukul Online Library Management System 3.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/student-history.php. The manipulation of the argument stdid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7601 is a cross-site scripting (XSS) vulnerability identified in version 3.0 of the PHPGurukul Online Library Management System, specifically within the /admin/student-history.php file. The vulnerability arises from improper sanitization or validation of the 'stdid' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser when they access the affected page with a crafted 'stdid' parameter. The attack can be initiated remotely without authentication, although user interaction is required to trigger the malicious script execution (e.g., an administrator or user viewing the student history page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show that the attack is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, reflecting that the primary risk is the execution of malicious scripts that could lead to session hijacking, defacement, or phishing attacks within the administrative interface. No patches or known exploits in the wild have been reported at the time of publication. The vulnerability is publicly disclosed, which increases the risk of exploitation by opportunistic attackers.
Potential Impact
For European organizations using PHPGurukul Online Library Management System 3.0, this vulnerability poses a risk primarily to the integrity and security of administrative user sessions. Successful exploitation could lead to session hijacking, unauthorized actions performed by administrators, or the injection of malicious content that could mislead users or compromise sensitive data related to library management. While the confidentiality impact is limited, the integrity of administrative operations could be undermined, potentially affecting the accuracy of student records or library transactions. Given that the attack requires user interaction, the risk is higher in environments where administrators frequently access the student history page and may be targeted via phishing or social engineering. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities. European educational institutions or libraries using this system may face reputational damage, operational disruptions, and compliance risks under data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement input validation and output encoding on the 'stdid' parameter within /admin/student-history.php to prevent injection of malicious scripts. Specifically, employ context-aware encoding (e.g., HTML entity encoding) before rendering user-supplied input in the web interface. If possible, update or patch the PHPGurukul Online Library Management System to a version that addresses this vulnerability once available. In the absence of an official patch, consider applying web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'stdid' parameter. Additionally, restrict administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of session compromise. Conduct security awareness training for administrators to recognize phishing attempts that could deliver malicious links exploiting this vulnerability. Regularly monitor logs for unusual activity related to the student-history.php page and implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7601: Cross Site Scripting in PHPGurukul Online Library Management System
Description
A vulnerability has been found in PHPGurukul Online Library Management System 3.0 and classified as problematic. This vulnerability affects unknown code of the file /admin/student-history.php. The manipulation of the argument stdid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7601 is a cross-site scripting (XSS) vulnerability identified in version 3.0 of the PHPGurukul Online Library Management System, specifically within the /admin/student-history.php file. The vulnerability arises from improper sanitization or validation of the 'stdid' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser when they access the affected page with a crafted 'stdid' parameter. The attack can be initiated remotely without authentication, although user interaction is required to trigger the malicious script execution (e.g., an administrator or user viewing the student history page). The CVSS 4.0 base score is 5.1, indicating a medium severity level. The vector details show that the attack is network exploitable (AV:N), requires low attack complexity (AC:L), no privileges (PR:L) but does require user interaction (UI:P). The impact on confidentiality is none, integrity is low, and availability is none, reflecting that the primary risk is the execution of malicious scripts that could lead to session hijacking, defacement, or phishing attacks within the administrative interface. No patches or known exploits in the wild have been reported at the time of publication. The vulnerability is publicly disclosed, which increases the risk of exploitation by opportunistic attackers.
Potential Impact
For European organizations using PHPGurukul Online Library Management System 3.0, this vulnerability poses a risk primarily to the integrity and security of administrative user sessions. Successful exploitation could lead to session hijacking, unauthorized actions performed by administrators, or the injection of malicious content that could mislead users or compromise sensitive data related to library management. While the confidentiality impact is limited, the integrity of administrative operations could be undermined, potentially affecting the accuracy of student records or library transactions. Given that the attack requires user interaction, the risk is higher in environments where administrators frequently access the student history page and may be targeted via phishing or social engineering. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities. European educational institutions or libraries using this system may face reputational damage, operational disruptions, and compliance risks under data protection regulations such as GDPR if personal data is exposed or manipulated.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement input validation and output encoding on the 'stdid' parameter within /admin/student-history.php to prevent injection of malicious scripts. Specifically, employ context-aware encoding (e.g., HTML entity encoding) before rendering user-supplied input in the web interface. If possible, update or patch the PHPGurukul Online Library Management System to a version that addresses this vulnerability once available. In the absence of an official patch, consider applying web application firewall (WAF) rules to detect and block suspicious payloads targeting the 'stdid' parameter. Additionally, restrict administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of session compromise. Conduct security awareness training for administrators to recognize phishing attempts that could deliver malicious links exploiting this vulnerability. Regularly monitor logs for unusual activity related to the student-history.php page and implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-13T14:34:01.377Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6874f886a83201eaacc6357d
Added to database: 7/14/2025, 12:31:02 PM
Last enriched: 7/14/2025, 12:46:26 PM
Last updated: 10/17/2025, 12:22:00 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-23073: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in Wikimedia Foundation Mediawiki - GlobalBlocking Extension
LowCVE-2025-62504: CWE-416: Use After Free in envoyproxy envoy
MediumCVE-2025-11864: Server-Side Request Forgery in NucleoidAI Nucleoid
MediumCVE-2024-42192: CWE-522 Insufficiently Protected Credentials in HCL Software Traveler for Microsoft Outlook
MediumCVE-2025-60358: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.