Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

0
Medium
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 12/24/2025, 01:45:37 UTC

Technical Analysis

The security threat concerns a reflected Cross-Site Scripting (XSS) vulnerability identified in phpIPAM version 1.6, an open-source PHP-based IP address management application widely used by enterprises and service providers. The vulnerability, tracked as CVE-2024-41357, arises from insufficient input validation and output encoding of the domain_id parameter in the /app/admin/powerDNS/record-edit.php endpoint. An attacker can exploit this flaw by sending a crafted POST request embedding malicious JavaScript code within the domain_id parameter. When an authenticated administrator accesses the affected endpoint, the injected script is reflected in the HTTP response and executed by the victim's browser. This reflected XSS enables attackers to hijack admin sessions, steal authentication tokens, or execute arbitrary scripts with admin privileges, potentially leading to unauthorized manipulation of IP address records and DNS configurations. The exploit requires valid admin credentials or social engineering to trick an admin into clicking a malicious link, limiting the attack surface but still posing a significant risk. The proof-of-concept exploit code is publicly available in plain text format, facilitating weaponization. No official patches or fixes are currently linked, but monitoring the phpIPAM GitHub repository and community forums is advised. The vulnerability was tested on Windows but likely affects all platforms running phpIPAM 1.6. The presence of this vulnerability in critical network infrastructure management software underscores the importance of prompt mitigation.

Potential Impact

For European organizations, this vulnerability presents a moderate risk primarily to network infrastructure management systems using phpIPAM 1.6. Successful exploitation could compromise administrative sessions, allowing attackers to manipulate IP address records and DNS configurations, potentially causing network outages, misrouting, or data integrity issues. Confidentiality may be impacted through theft of session tokens or credentials, while integrity of network configurations could be undermined, leading to service disruptions or enabling lateral movement within corporate networks. Although availability impact is indirect, malicious modification of DNS or IPAM data could cause significant operational disruptions. The requirement for admin authentication reduces the likelihood of widespread exploitation; however, insider threats or phishing attacks targeting administrators increase the risk. The lack of known exploits in the wild currently limits immediate impact, but the availability of proof-of-concept code raises the risk of future targeted attacks. Organizations managing critical infrastructure or large enterprise networks are particularly vulnerable due to the strategic importance of IP address management.

Mitigation Recommendations

1. Restrict access to the phpIPAM administrative interface to trusted personnel and networks using network segmentation, VPNs, and firewall rules. 2. Enforce strong authentication for admin accounts, including multi-factor authentication (MFA), to reduce risk of credential compromise. 3. Monitor and audit administrative user activities for suspicious behavior indicative of exploitation attempts. 4. Implement strict input validation and output encoding on all user-supplied data, especially the domain_id parameter in the powerDNS record-edit.php endpoint. 5. Regularly monitor the official phpIPAM GitHub repository and community forums for patches or updates addressing this vulnerability and apply them promptly. 6. Deploy Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter if patching is not immediately possible. 7. Educate administrators on phishing and social engineering risks to prevent attackers from gaining admin session access. 8. Conduct regular penetration testing and vulnerability scanning focused on web application security to proactively identify similar issues. 9. Harden session management policies by limiting session lifetime, scope, and implementing secure cookie attributes to reduce session hijacking risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Edb Id
52442
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

# Exploit Title: phpIPAM 1.6 - Reflected Cross-Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/phpipam/phpipam/
# Software Link: https://github.com/phpipam/phpipam/
# Version: 1.5.1 
# Tested on: Windows
# CVE : CVE-2024-41357


Proof Of Concept
# PoC to trigger XSS vulnerability in phpipam 1.6
# Ensure you are logged in as an admin user to satisfy the admin check condition.
# Send the following POST request to trigger the XSS vulnerabil
... (302 more characters)
Code Length: 802 characters

Threat ID: 692f27653286267b25e73ffb

Added to database: 12/2/2025, 5:52:37 PM

Last enriched: 12/24/2025, 1:45:37 AM

Last updated: 1/18/2026, 11:38:34 AM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats