Skip to main content

CVE-2025-7819: Cross Site Scripting in PHPGurukul Apartment Visitors Management System

Medium
VulnerabilityCVE-2025-7819cvecve-2025-7819
Published: Sat Jul 19 2025 (07/19/2025, 12:14:07 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Apartment Visitors Management System

Description

A vulnerability was found in PHPGurukul Apartment Visitors Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /create-pass.php of the component HTTP POST Request Handler. The manipulation of the argument visname leads to cross site scripting. It is possible to initiate the attack remotely.

AI-Powered Analysis

AILast updated: 07/27/2025, 00:57:43 UTC

Technical Analysis

CVE-2025-7819 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Apartment Visitors Management System. The vulnerability exists in the /create-pass.php file, specifically in the HTTP POST request handler that processes the 'visname' parameter. An attacker can manipulate this parameter to inject malicious scripts, which are then executed in the context of the victim's browser. This type of vulnerability allows an attacker to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without authentication, but requires user interaction (e.g., the victim must visit a crafted URL or submit a form containing the malicious payload). The CVSS 4.0 base score is 4.8, indicating a medium severity level. The vector string indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required but this conflicts with AT:N - likely a data inconsistency; assuming no privileges required), user interaction is required (UI:P), and the impact is limited primarily to integrity (VI:L) with no impact on confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been linked yet.

Potential Impact

For European organizations using PHPGurukul Apartment Visitors Management System 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions, steal sensitive information, or manipulate the user interface. Since the system manages visitor information for apartment complexes, exploitation could lead to unauthorized access to visitor logs or manipulation of visitor credentials, potentially undermining physical security controls. The impact is particularly relevant for property management companies, residential complexes, and housing cooperatives that rely on this software for visitor management. Although the vulnerability does not directly affect server confidentiality or availability, the integrity and trustworthiness of the system's user interface and data can be compromised, leading to reputational damage and potential regulatory scrutiny under GDPR if personal data is exposed or misused.

Mitigation Recommendations

Organizations should immediately audit their use of PHPGurukul Apartment Visitors Management System version 1.0 and assess exposure to the /create-pass.php endpoint. Since no official patch is currently available, mitigation should focus on implementing input validation and output encoding on the 'visname' parameter to neutralize malicious scripts. Web application firewalls (WAFs) can be configured to detect and block typical XSS payloads targeting this parameter. Additionally, organizations should educate users about the risks of clicking on suspicious links and implement Content Security Policy (CSP) headers to restrict script execution sources. Monitoring logs for unusual POST requests to /create-pass.php and anomalous user behavior can help detect exploitation attempts. Finally, organizations should engage with the vendor to obtain patches or updates and plan for timely application once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-18T17:34:25.421Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687b900ea83201eaacfcebd9

Added to database: 7/19/2025, 12:31:10 PM

Last enriched: 7/27/2025, 12:57:43 AM

Last updated: 8/25/2025, 11:05:45 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats