Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8115: Cross Site Scripting in PHPGurukul Taxi Stand Management System

0
Medium
VulnerabilityCVE-2025-8115cvecve-2025-8115
Published: Thu Jul 24 2025 (07/24/2025, 18:32:06 UTC)
Source: CVE Database V5
Vendor/Project: PHPGurukul
Product: Taxi Stand Management System

Description

A vulnerability has been found in PHPGurukul Taxi Stand Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument registrationnumber/licensenumber leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/24/2025, 19:02:46 UTC

Technical Analysis

CVE-2025-8115 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Taxi Stand Management System, specifically within the /admin/new-autoortaxi-entry-form.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the 'registrationnumber' or 'licensenumber' parameters. An attacker can craft malicious input that, when processed by the vulnerable web application, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This vulnerability is exploitable remotely without authentication, although it requires user interaction (e.g., an administrator or user visiting a crafted URL or submitting a form). The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges required but partial privileges (PR:L) are needed, user interaction is required, and partial impact on integrity and availability, with no impact on confidentiality. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The Taxi Stand Management System is likely used by taxi companies or municipal transport authorities to manage vehicle registrations and dispatching, making the affected functionality critical for operational integrity and data accuracy. Exploitation could allow attackers to execute scripts that steal session tokens, manipulate displayed data, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or disruption of service.

Potential Impact

For European organizations, especially those operating taxi fleets or municipal transport services using PHPGurukul's Taxi Stand Management System, this vulnerability poses a risk of session hijacking, unauthorized data manipulation, and potential disruption of taxi dispatch operations. Given the administrative nature of the vulnerable endpoint, successful exploitation could compromise administrative accounts, leading to broader system misuse or data integrity issues. This could affect service reliability, customer trust, and regulatory compliance, particularly under GDPR if personal data is exposed or manipulated. The medium severity rating reflects moderate risk, but the potential for targeted attacks against transport infrastructure or service providers in Europe could elevate operational risks. Additionally, the remote exploitability without elevated privileges increases the attack surface, especially if administrative users are tricked into interacting with malicious content.

Mitigation Recommendations

Organizations should immediately review and sanitize all inputs on the /admin/new-autoortaxi-entry-form.php page, specifically the 'registrationnumber' and 'licensenumber' parameters, to ensure proper encoding and validation against XSS payloads. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting will reduce exposure. Regularly updating the PHPGurukul Taxi Stand Management System to patched versions once available is critical. In the absence of official patches, applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting these parameters can provide interim protection. Training administrative users to recognize phishing or social engineering attempts that could lead to user interaction with malicious payloads is also recommended. Finally, monitoring logs for unusual activity around the vulnerable endpoint can help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-24T13:34:45.901Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68827fd0ad5a09ad0041a727

Added to database: 7/24/2025, 6:47:44 PM

Last enriched: 7/24/2025, 7:02:46 PM

Last updated: 10/30/2025, 2:10:00 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats