CVE-2024-55271
Received Received - Intake
CSRF Vulnerability in phpgurukul Gym Management System Profile Update

Publication date: 2026-02-17

Last updated on: 2026-02-23

Assigner: MITRE

Description
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in phpgurukul Gym Management System 1.0. This issue is present in the profile update functionality of the User Panel, specifically the /profile.php endpoint.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-17
Last Modified
2026-02-23
Generated
2026-05-06
AI Q&A
2026-02-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
phpgurukul gym_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'This vulnerability is a Cross-Site Request Forgery (CSRF) issue found in the phpgurukul Gym Management System 1.0. It specifically affects the profile update functionality in the User Panel at the /profile.php endpoint.'}, {'type': 'paragraph', 'content': "Because the system lacks Anti-CSRF tokens, an attacker can trick a logged-in user into submitting unauthorized requests that modify sensitive profile information such as first name, last name, email, mobile number, state, city, and address without the user's consent."}, {'type': 'paragraph', 'content': 'A proof of concept demonstrates how an attacker can create a malicious HTML form that automatically submits a POST request to /profile.php with attacker-controlled values, exploiting the absence of CSRF protection.'}] [2]


How can this vulnerability impact me? :

This vulnerability can allow an attacker to alter your user profile information without your knowledge or consent.

  • Modification of sensitive data such as your first name, last name, email, mobile number, state, city, and address.
  • Compromise of account integrity, potentially leading to further security issues.

Such unauthorized changes could be used for identity manipulation, phishing, or other malicious activities targeting your account.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unauthorized POST requests to the /profile.php endpoint of the phpgurukul Gym Management System, especially those that attempt to update user profile fields such as fname, lname, email, mobile, state, city, and address without proper user interaction.'}, {'type': 'paragraph', 'content': 'A practical way to detect exploitation attempts is to capture and analyze HTTP traffic using tools like Burp Suite or network packet analyzers to identify suspicious POST requests lacking valid Anti-CSRF tokens.'}, {'type': 'paragraph', 'content': 'Commands to help detect this might include using curl or wget to simulate requests and observe responses, or using network monitoring tools to filter traffic:'}, {'type': 'list_item', 'content': 'Use curl to test the /profile.php endpoint for CSRF protection absence: curl -X POST -d "fname=test&lname=test" http://targetsite/profile.php -v'}, {'type': 'list_item', 'content': "Use tcpdump or tshark to capture HTTP POST requests to /profile.php: tcpdump -i eth0 -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '/profile.php'"}, {'type': 'list_item', 'content': 'Use Burp Suite to intercept and analyze POST requests to /profile.php to check for missing Anti-CSRF tokens.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this CSRF vulnerability in the phpgurukul Gym Management System, the immediate step is to implement Anti-CSRF tokens in the profile update functionality at the /profile.php endpoint.

This involves generating a unique token for each user session and validating this token on every POST request to ensure that the request is legitimate and originated from the authenticated user.

Additionally, you should consider implementing other security best practices such as validating the HTTP Referer header, enforcing same-site cookies, and ensuring that sensitive actions require user interaction.

Until a patch is applied, restricting access to the /profile.php endpoint and monitoring for suspicious activity can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart