Skip to main content

CVE-2025-7924: Cross Site Scripting in PHPGurukul Online Banquet Booking System

Medium
VulnerabilityCVE-2025-7924cvecve-2025-7924
Published: Mon Jul 21 2025 (07/21/2025, 11:02:07 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Online Banquet Booking System

Description

A vulnerability classified as problematic was found in PHPGurukul Online Banquet Booking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/21/2025, 11:31:20 UTC

Technical Analysis

CVE-2025-7924 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Online Banquet Booking System, specifically within the /admin/admin-profile.php file. The vulnerability arises from improper sanitization or validation of the 'adminname' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of an authenticated administrator's browser session. The attack vector is remote and does not require prior authentication, although the CVSS vector indicates a low privilege requirement (PR:L) and user interaction (UI:P) is necessary, meaning the attacker must trick an admin user into triggering the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, categorized as medium severity. The impact primarily affects the confidentiality and integrity of the administrator's session and data, potentially enabling session hijacking, credential theft, or unauthorized actions within the admin panel. No known exploits are currently reported in the wild, but the exploit details have been publicly disclosed, increasing the risk of exploitation. The lack of available patches or official remediation from the vendor increases the urgency for organizations to implement mitigations. Given the administrative context of the vulnerability, successful exploitation could lead to significant control over the booking system's backend, affecting data integrity and availability indirectly through malicious administrative actions.

Potential Impact

For European organizations using the PHPGurukul Online Banquet Booking System, this vulnerability poses a moderate risk. Successful exploitation could compromise administrative accounts, leading to unauthorized access to sensitive booking data, manipulation of event schedules, or disruption of service availability. This could result in reputational damage, loss of customer trust, and potential regulatory non-compliance, especially under GDPR, if personal data is exposed or altered. The medium severity score reflects that while the vulnerability requires user interaction and some privilege, the administrative context elevates the potential damage. Organizations relying on this system for event management or customer engagement could face operational disruptions and financial losses. Additionally, the public disclosure of the exploit increases the likelihood of targeted attacks, particularly against organizations with less mature cybersecurity defenses or those that have not applied mitigations promptly.

Mitigation Recommendations

To mitigate this vulnerability effectively, European organizations should: 1) Immediately restrict access to the /admin/admin-profile.php page using network-level controls such as IP whitelisting or VPN access to limit exposure to trusted administrators only. 2) Implement web application firewall (WAF) rules specifically designed to detect and block malicious payloads targeting the 'adminname' parameter, including common XSS attack patterns. 3) Conduct thorough input validation and output encoding on all user-supplied data, especially parameters used in administrative interfaces, to prevent script injection. 4) Educate administrative users about the risks of phishing and social engineering attacks that could trigger the malicious payload, emphasizing cautious handling of unexpected links or inputs. 5) Monitor administrative logs and web server access logs for unusual activities or repeated attempts to exploit the vulnerability. 6) If possible, upgrade or patch the application once an official fix is released by the vendor. Until then, consider isolating the booking system from the internet or deploying it behind additional security layers. 7) Regularly review and update security policies related to administrative access and session management to minimize the impact of potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-21T06:25:26.749Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687e2174a83201eaac0ea5da

Added to database: 7/21/2025, 11:16:04 AM

Last enriched: 7/21/2025, 11:31:20 AM

Last updated: 7/22/2025, 8:12:37 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats