CVE-2024-51224
Multiple XSS Vulnerabilities in Phpgurukul Vehicle Management Admin Panel
Publication date: 2026-03-23
Last updated on: 2026-03-24
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| phpgurukul | vehicle_record_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2024-51224 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Phpgurukul Vehicle Record Management System version 1.0, specifically in the /admin/edit-vehicle.php page.
The vulnerability occurs because six POST parametersβvehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum, and enginenumberβare accepted from user input and stored directly into the database without any sanitization.
When the Edit Vehicle page is loaded, these stored values are rendered back into the HTML input fields without output encoding, allowing attackers to execute arbitrary JavaScript in the browser.
Each of these six parameters independently serves as a stored XSS vector, significantly increasing the attack surface on a single page.
How can this vulnerability impact me? :
This vulnerability can lead to multiple serious impacts including:
- Mass persistent XSS attacks on the admin interface.
- Session hijacking through exfiltration of admin session cookies.
- Privilege escalation by compromising higher-privilege admin sessions.
- Data exfiltration from the system.
- Phishing or redirection attacks targeting administrators.
- Denial of service by breaking the user interface for admins managing affected vehicle records.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the /admin/edit-vehicle.php page of the Phpgurukul Vehicle Record Management System version 1.0 for stored Cross-Site Scripting (XSS) in the six POST parameters: vehiclename, modelnumber, regnumber, vehiclesubtype, chasisnum, and enginenumber.'}, {'type': 'paragraph', 'content': 'A practical detection method involves injecting a crafted payload such as "><script>alert(\'CVE-2024-51224\')</script>" into each of these fields via a POST request, submitting the form, and then reloading the edit page to see if the alert box appears, indicating persistent XSS.'}, {'type': 'paragraph', 'content': 'Commands to test this could include using curl or similar tools to send POST requests with the payload, for example:'}, {'type': 'list_item', 'content': 'curl -X POST -d "vehiclename=\\"><script>alert(\'CVE-2024-51224\')</script>&modelnumber=test®number=test&vehiclesubtype=test&chasisnum=test&enginenumber=test" https://targetsite/admin/edit-vehicle.php'}, {'type': 'paragraph', 'content': 'After submitting, manually reload the edit page in a browser to check for the alert popup, confirming the vulnerability.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation involves applying proper input sanitization and output encoding to all affected parameters in the /admin/edit-vehicle.php page.'}, {'type': 'paragraph', 'content': "Specifically, sanitize inputs before storage using PHP's htmlspecialchars() function with ENT_QUOTES and UTF-8 parameters, and apply output encoding when rendering these values back into HTML input fields."}, {'type': 'list_item', 'content': "Sanitize inputs before storage, e.g.: $vehiclename = htmlspecialchars(trim($_POST['vehiclename']), ENT_QUOTES, 'UTF-8');"}, {'type': 'list_item', 'content': "Encode outputs when rendering, e.g.: echo htmlspecialchars($vehiclename, ENT_QUOTES, 'UTF-8');"}, {'type': 'paragraph', 'content': 'Additional hardening steps include implementing a Content Security Policy (CSP) header, applying format-specific validation for each field (such as pattern matching for registration numbers and alphanumeric checks for chassis and engine numbers), and using a global output encoding helper function to prevent future omissions.'}] [1]