CVE-2025-57150

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to inject malicious scripts into the Complaint Management System's admin interface via the categoryName parameter. When an administrator views the affected page, the script executes in their browser context, potentially compromising the admin session. This affects all deployments of phpgurukul Complaint Management System 2.0.

💻 Affected Systems

Products:
  • phpgurukul Complaint Management System
Versions: 2.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to the vulnerable page (admin/subcategory.php).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account takeover leading to complete system compromise, data theft, or deployment of backdoors.

🟠

Likely Case

Session hijacking of admin accounts, unauthorized access to sensitive complaint data, or defacement of admin interface.

🟢

If Mitigated

Limited to reflected XSS impact with proper input validation and output encoding in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires targeting admin users who access the vulnerable page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No vendor advisory found

Restart Required: No

Instructions:

1. Locate admin/subcategory.php
2. Implement proper input validation for categoryName parameter
3. Apply output encoding when displaying user-supplied data
4. Test the fix thoroughly

🔧 Temporary Workarounds

Input Validation Filter

all

Add server-side validation to sanitize categoryName parameter

// In admin/subcategory.php, add: $categoryName = htmlspecialchars($_POST['categoryName'], ENT_QUOTES, 'UTF-8');

Content Security Policy

all

Implement CSP headers to restrict script execution

Header set Content-Security-Policy "default-src 'self'; script-src 'self'" in .htaccess or server config

🧯 If You Can't Patch

  • Restrict admin panel access to trusted IP addresses only
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test by submitting <script>alert('XSS')</script> to categoryName parameter in admin/subcategory.php

Check Version:

Check version in system documentation or configuration files

Verify Fix Applied:

Verify that script tags are properly encoded when displayed in the admin interface

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to admin/subcategory.php with script-like content in parameters

Network Indicators:

  • HTTP requests containing script tags or JavaScript in categoryName parameter

SIEM Query:

source="web_logs" AND uri="/admin/subcategory.php" AND (param="categoryName" AND value MATCHES "<script.*>.*</script>" OR "javascript:")

🔗 References

📤 Share & Export