CVE-2025-45009

5.3 MEDIUM

📋 TL;DR

A HTML injection vulnerability in PHPGurukul Park Ticketing Management System v2.0 allows remote attackers to inject malicious HTML/JavaScript via the searchdata parameter in normal-search.php. This affects all deployments of the vulnerable version, potentially enabling cross-site scripting (XSS) attacks against users and administrators.

💻 Affected Systems

Products:
  • PHPGurukul Park Ticketing Management System
Versions: v2.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation; no special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary JavaScript in users' browsers, leading to session hijacking, credential theft, or complete system compromise if combined with other vulnerabilities.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies, redirect users to phishing sites, or deface the application interface.

🟢

If Mitigated

With proper input validation and output encoding, the injected content would be rendered harmless as plain text.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a web browser and knowledge of HTML/JavaScript injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch exists. Implement input validation and output encoding in normal-search.php to sanitize the searchdata parameter.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Modify normal-search.php to validate and encode the searchdata parameter before processing or displaying it.

Edit normal-search.php and add: $searchdata = htmlspecialchars($_POST['searchdata'], ENT_QUOTES, 'UTF-8');

Web Application Firewall (WAF) Rule

all

Deploy a WAF rule to block requests containing HTML/JavaScript patterns in the searchdata parameter.

Configure WAF to block: searchdata.*[<\/\s\w=]+

🧯 If You Can't Patch

  • Restrict access to the vulnerable system using network segmentation or IP whitelisting.
  • Monitor and log all requests to normal-search.php for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Test by submitting HTML payload (e.g., <script>alert('XSS')</script>) via the searchdata parameter and check if it executes.

Check Version:

Check the system's version in its documentation or configuration files; no standard command exists.

Verify Fix Applied:

After applying fixes, test with the same payload; it should be displayed as plain text without execution.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing HTML/JavaScript patterns in searchdata parameter requests.

Network Indicators:

  • HTTP POST requests to normal-search.php with suspicious payloads in searchdata.

SIEM Query:

source="web_logs" AND uri="/normal-search.php" AND request_body CONTAINS "<script>"

🔗 References

📤 Share & Export