First published: Mon Jul 10 2023(Updated: )
Cross Site Scripting vulnerability in Hostel Management System v2.1 allows an attacker to execute arbitrary code via a crafted payload to the Guardian name, Guardian relation, complimentary address, city, permanent address, and city parameters in the Book Hostel & Room Details page.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hostel Management System Project Hostel Management System | =2.1 | |
PHPGurukul Hostel Management System | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36375 is a Cross Site Scripting vulnerability in Hostel Management System v2.1 that allows an attacker to execute arbitrary code.
The vulnerability in Hostel Management System v2.1 allows an attacker to execute arbitrary code by providing a crafted payload to certain parameters in the Book Hostel & Room Details page.
The Guardian name, Guardian relation, complimentary address, city, permanent address, and city parameters in the Book Hostel & Room Details page are affected by the Cross Site Scripting vulnerability in Hostel Management System v2.1.
CVE-2023-36375 has a severity rating of medium with a score of 5.4.
To fix the Cross Site Scripting vulnerability in Hostel Management System v2.1, it is recommended to apply the latest security patches or updates provided by the software vendor.