CVE-2025-50486

7.1 HIGH

📋 TL;DR

This vulnerability allows attackers to hijack user sessions in PHPGurukul Car Rental Project v3.0 due to improper session invalidation in the password update component. Attackers can maintain access to authenticated sessions even after password changes, affecting all users of the vulnerable application.

💻 Affected Systems

Products:
  • PHPGurukul Car Rental Project
Versions: v3.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific /carrental/update-password.php component. Requires the application to be deployed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain persistent unauthorized access to user accounts, potentially compromising sensitive data, performing unauthorized actions, or escalating privileges within the application.

🟠

Likely Case

Attackers hijack active user sessions to access personal information, modify reservations, or perform unauthorized transactions within the car rental system.

🟢

If Mitigated

Limited impact with proper session management controls, but still exposes users to credential theft and unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial session access but is straightforward once obtained. Public proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://phpgurukul.com

Restart Required: No

Instructions:

1. Check vendor website for updates. 2. If no patch, implement workarounds. 3. Modify update-password.php to properly invalidate sessions.

🔧 Temporary Workarounds

Manual Session Invalidation Fix

all

Modify update-password.php to destroy and regenerate session IDs upon password change

Edit /carrental/update-password.php to add: session_regenerate_id(true); session_destroy();

🧯 If You Can't Patch

  • Implement additional authentication factors for sensitive operations
  • Monitor for unusual session activity and implement session timeout policies

🔍 How to Verify

Check if Vulnerable:

Test if session persists after password change by logging in, changing password, then checking if old session still works

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

After applying fix, verify that old sessions are invalidated immediately after password changes

📡 Detection & Monitoring

Log Indicators:

  • Multiple concurrent sessions from same user
  • Password change events without session termination
  • Unusual session duration

Network Indicators:

  • Repeated authentication attempts
  • Session cookie reuse across different IPs

SIEM Query:

source="web_logs" AND (event="password_change" AND NOT event="session_destroy")

🔗 References

📤 Share & Export