Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

0
Medium
Published: Tue Dec 02 2025 (12/02/2025, 00:00:00 UTC)
Source: Exploit-DB RSS Feed

Description

phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

AI-Powered Analysis

AILast updated: 12/02/2025, 17:54:29 UTC

Technical Analysis

The security threat concerns a reflected Cross-Site Scripting (XSS) vulnerability identified in phpIPAM version 1.6, an open-source PHP-based IP address management application widely used for managing network IP address spaces. The vulnerability is tracked as CVE-2024-41357 and was disclosed with proof-of-concept exploit code in late 2025. The attack vector involves sending a crafted POST request to the /app/admin/powerDNS/record-edit.php endpoint with a malicious payload injected into the domain_id parameter. When an authenticated administrator accesses this endpoint, the injected script is reflected in the HTTP response without proper sanitization or encoding, causing the victim's browser to execute the malicious JavaScript code. This reflected XSS can be exploited to perform actions such as session hijacking, stealing authentication tokens, or executing arbitrary scripts in the context of the admin user’s session. The exploit requires the attacker to have valid admin credentials or to trick an admin into clicking a malicious link while logged in, which limits the attack surface but still poses a significant risk. The vulnerability stems from insufficient input validation and output encoding in the affected phpIPAM component. Although no patches or official fixes are currently linked, the vendor’s GitHub repository and community forums should be monitored for updates. The exploit was tested on Windows environments but likely affects all platforms running the vulnerable phpIPAM version. The presence of exploit code in text format facilitates weaponization by attackers. Organizations relying on phpIPAM 1.6 for IP address management should assess exposure and implement mitigations promptly.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to network infrastructure management systems using phpIPAM 1.6. Successful exploitation could compromise administrative sessions, allowing attackers to manipulate IP address records, disrupt DNS configurations, or gain further footholds within the network. This could lead to data integrity issues, service disruptions, or lateral movement within corporate networks. Given that phpIPAM is often deployed in enterprise and service provider environments, the impact extends to critical infrastructure management. Confidentiality may be compromised if session tokens or credentials are stolen. Integrity of network configurations can be undermined, potentially causing outages or misrouting. Availability impact is indirect but possible if attackers modify DNS or IPAM data maliciously. The requirement for admin authentication reduces the likelihood of widespread exploitation but insider threats or phishing attacks targeting admins increase risk. The lack of known exploits in the wild currently limits immediate impact but the availability of proof-of-concept code raises the risk of future attacks.

Mitigation Recommendations

1. Immediately restrict access to the phpIPAM administrative interface to trusted personnel and networks using network segmentation and firewall rules. 2. Enforce strong authentication mechanisms for admin accounts, including multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Monitor and audit admin user activities for suspicious behavior that could indicate exploitation attempts. 4. Apply strict input validation and output encoding on all user-supplied data, especially the domain_id parameter in the powerDNS record-edit.php endpoint. 5. Regularly check the official phpIPAM GitHub repository and community channels for patches or updates addressing this vulnerability and apply them promptly. 6. If patching is not immediately possible, consider implementing Web Application Firewall (WAF) rules to detect and block malicious payloads targeting the vulnerable parameter. 7. Educate administrators about phishing and social engineering risks to prevent attackers from gaining admin session access. 8. Conduct penetration testing and vulnerability scanning focused on web application security to identify similar issues proactively. 9. Review and harden session management policies to limit session lifetime and scope.

Need more detailed analysis?Get Pro

Technical Details

Edb Id
52442
Has Exploit Code
true
Code Language
text

Indicators of Compromise

Exploit Source Code

Exploit Code

Exploit code for phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)

# Exploit Title: phpIPAM 1.6 - Reflected Cross-Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/phpipam/phpipam/
# Software Link: https://github.com/phpipam/phpipam/
# Version: 1.5.1 
# Tested on: Windows
# CVE : CVE-2024-41357


Proof Of Concept
# PoC to trigger XSS vulnerability in phpipam 1.6
# Ensure you are logged in as an admin user to satisfy the admin check condition.
# Send the following POST request to trigger the XSS vulnerabil
... (302 more characters)
Code Length: 802 characters

Threat ID: 692f27653286267b25e73ffb

Added to database: 12/2/2025, 5:52:37 PM

Last enriched: 12/2/2025, 5:54:29 PM

Last updated: 12/5/2025, 1:36:00 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats