CVE-2025-50695

6.1 MEDIUM

📋 TL;DR

PHPGurukul Online DJ Booking Management System 2.0 contains stored cross-site scripting vulnerabilities in admin panel pages. Attackers can inject malicious scripts that execute when administrators view booking details or invoices, potentially compromising admin sessions. This affects all installations of version 2.0 with default configurations.

💻 Affected Systems

Products:
  • PHPGurukul Online DJ Booking Management System
Versions: 2.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; requires admin panel access for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account takeover leading to complete system compromise, data theft, or ransomware deployment

🟠

Likely Case

Session hijacking allowing attacker to perform unauthorized administrative actions

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to create bookings or access to booking system; GitHub repository contains proof-of-concept

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Apply input validation and output encoding to affected files: /admin/view-booking-detail.php and /admin/invoice-generating.php

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input sanitization and output encoding in vulnerable PHP files

Edit affected PHP files to add htmlspecialchars() or htmlentities() around user-controlled output

Content Security Policy

all

Implement CSP headers to restrict script execution

Add header("Content-Security-Policy: default-src 'self'") to PHP files

🧯 If You Can't Patch

  • Restrict admin panel access to trusted IP addresses only
  • Implement web application firewall with XSS protection rules

🔍 How to Verify

Check if Vulnerable:

Test by submitting booking with XSS payload and checking if it executes in admin panel

Check Version:

Check system version in admin panel or configuration files

Verify Fix Applied:

Attempt to inject XSS payload and verify it's properly encoded in output

📡 Detection & Monitoring

Log Indicators:

  • Unusual booking submissions with script tags or JavaScript code
  • Multiple failed login attempts to admin panel following booking creation

Network Indicators:

  • HTTP requests containing script tags or JavaScript in booking parameters
  • Unexpected outbound connections from admin panel

SIEM Query:

source="web_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=") AND uri="/admin/view-booking-detail.php"

🔗 References

📤 Share & Export