CVE-2025-70891

6.1 MEDIUM

📋 TL;DR

A stored cross-site scripting vulnerability in Phpgurukul Cyber Cafe Management System v1.0 allows authenticated attackers to inject malicious JavaScript via the user management module. The payload executes when privileged users view affected user records, potentially compromising their sessions and system access. This affects all installations of the vulnerable software version.

💻 Affected Systems

Products:
  • Phpgurukul Cyber Cafe Management System
Versions: v1.0
Operating Systems: Any OS running PHP/MySQL
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PHP and MySQL environment; vulnerability exists in default installation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged user account takeover leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Session hijacking of admin accounts, unauthorized access to sensitive cafe management data, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting individual user sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access; public proof-of-concept available in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider implementing input validation and output encoding as workaround.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input sanitization for uadd parameter and HTML encode output in view-allusers.php

Edit add-users.php to validate/sanitize uadd input
Edit view-allusers.php to use htmlspecialchars() or similar encoding

🧯 If You Can't Patch

  • Restrict access to user management module to trusted administrators only
  • Implement web application firewall rules to block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Test by submitting JavaScript payload via uadd parameter in add-users.php and checking if it executes in view-allusers.php

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Verify that submitted JavaScript payloads are properly encoded and do not execute in view-allusers.php

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in POST requests to add-users.php
  • Multiple user creation attempts with similar patterns

Network Indicators:

  • HTTP requests containing script tags or JavaScript functions in uadd parameter

SIEM Query:

source="web_logs" AND (uri="/add-users.php" OR uri="/view-allusers.php") AND (content CONTAINS "<script>" OR content CONTAINS "javascript:")

🔗 References

📤 Share & Export