CVE-2025-8115: Cross Site Scripting in PHPGurukul Taxi Stand Management System
A vulnerability has been found in PHPGurukul Taxi Stand Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument registrationnumber/licensenumber leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-8115 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Taxi Stand Management System, specifically within the /admin/new-autoortaxi-entry-form.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the 'registrationnumber' or 'licensenumber' parameters. An attacker can craft malicious input that, when processed by the vulnerable web application, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This vulnerability is exploitable remotely without authentication, although it requires user interaction (e.g., an administrator or user visiting a crafted URL or submitting a form). The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges required but partial privileges (PR:L) are needed, user interaction is required, and partial impact on integrity and availability, with no impact on confidentiality. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The Taxi Stand Management System is likely used by taxi companies or municipal transport authorities to manage vehicle registrations and dispatching, making the affected functionality critical for operational integrity and data accuracy. Exploitation could allow attackers to execute scripts that steal session tokens, manipulate displayed data, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or disruption of service.
Potential Impact
For European organizations, especially those operating taxi fleets or municipal transport services using PHPGurukul's Taxi Stand Management System, this vulnerability poses a risk of session hijacking, unauthorized data manipulation, and potential disruption of taxi dispatch operations. Given the administrative nature of the vulnerable endpoint, successful exploitation could compromise administrative accounts, leading to broader system misuse or data integrity issues. This could affect service reliability, customer trust, and regulatory compliance, particularly under GDPR if personal data is exposed or manipulated. The medium severity rating reflects moderate risk, but the potential for targeted attacks against transport infrastructure or service providers in Europe could elevate operational risks. Additionally, the remote exploitability without elevated privileges increases the attack surface, especially if administrative users are tricked into interacting with malicious content.
Mitigation Recommendations
Organizations should immediately review and sanitize all inputs on the /admin/new-autoortaxi-entry-form.php page, specifically the 'registrationnumber' and 'licensenumber' parameters, to ensure proper encoding and validation against XSS payloads. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting will reduce exposure. Regularly updating the PHPGurukul Taxi Stand Management System to patched versions once available is critical. In the absence of official patches, applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting these parameters can provide interim protection. Training administrative users to recognize phishing or social engineering attempts that could lead to user interaction with malicious payloads is also recommended. Finally, monitoring logs for unusual activity around the vulnerable endpoint can help detect exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden
CVE-2025-8115: Cross Site Scripting in PHPGurukul Taxi Stand Management System
Description
A vulnerability has been found in PHPGurukul Taxi Stand Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/new-autoortaxi-entry-form.php. The manipulation of the argument registrationnumber/licensenumber leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-8115 is a cross-site scripting (XSS) vulnerability identified in version 1.0 of the PHPGurukul Taxi Stand Management System, specifically within the /admin/new-autoortaxi-entry-form.php file. The vulnerability arises from improper sanitization or validation of user-supplied input in the 'registrationnumber' or 'licensenumber' parameters. An attacker can craft malicious input that, when processed by the vulnerable web application, results in the injection and execution of arbitrary JavaScript code in the context of the victim's browser. This vulnerability is exploitable remotely without authentication, although it requires user interaction (e.g., an administrator or user visiting a crafted URL or submitting a form). The disclosed CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges required but partial privileges (PR:L) are needed, user interaction is required, and partial impact on integrity and availability, with no impact on confidentiality. The vulnerability has been publicly disclosed but no known exploits are currently observed in the wild. The Taxi Stand Management System is likely used by taxi companies or municipal transport authorities to manage vehicle registrations and dispatching, making the affected functionality critical for operational integrity and data accuracy. Exploitation could allow attackers to execute scripts that steal session tokens, manipulate displayed data, or perform actions on behalf of authenticated users, potentially leading to unauthorized access or disruption of service.
Potential Impact
For European organizations, especially those operating taxi fleets or municipal transport services using PHPGurukul's Taxi Stand Management System, this vulnerability poses a risk of session hijacking, unauthorized data manipulation, and potential disruption of taxi dispatch operations. Given the administrative nature of the vulnerable endpoint, successful exploitation could compromise administrative accounts, leading to broader system misuse or data integrity issues. This could affect service reliability, customer trust, and regulatory compliance, particularly under GDPR if personal data is exposed or manipulated. The medium severity rating reflects moderate risk, but the potential for targeted attacks against transport infrastructure or service providers in Europe could elevate operational risks. Additionally, the remote exploitability without elevated privileges increases the attack surface, especially if administrative users are tricked into interacting with malicious content.
Mitigation Recommendations
Organizations should immediately review and sanitize all inputs on the /admin/new-autoortaxi-entry-form.php page, specifically the 'registrationnumber' and 'licensenumber' parameters, to ensure proper encoding and validation against XSS payloads. Implementing Content Security Policy (CSP) headers can help mitigate the impact of injected scripts. Restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting will reduce exposure. Regularly updating the PHPGurukul Taxi Stand Management System to patched versions once available is critical. In the absence of official patches, applying web application firewall (WAF) rules to detect and block suspicious input patterns targeting these parameters can provide interim protection. Training administrative users to recognize phishing or social engineering attempts that could lead to user interaction with malicious payloads is also recommended. Finally, monitoring logs for unusual activity around the vulnerable endpoint can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-24T13:34:45.901Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68827fd0ad5a09ad0041a727
Added to database: 7/24/2025, 6:47:44 PM
Last enriched: 7/24/2025, 7:02:46 PM
Last updated: 7/25/2025, 12:49:37 PM
Views: 5
Related Threats
CVE-2025-8163: SQL Injection in deerwms deer-wms-2
MediumCVE-2025-5449: Integer Overflow or Wraparound
MediumCVE-2025-8162: SQL Injection in deerwms deer-wms-2
MediumCVE-2025-45893: n/a
HighCVE-2025-45960: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.