First published: Tue Oct 15 2024(Updated: )
A HTML Injection vulnerability was found in /search-result.php of PHPGurukul User Registration & Login and User Management System 3.2. This vulnerability allows remote attackers to execute arbitrary HTML code via the searchkey parameter in a POST HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHPGurukul User Registration & Login and User Management System | ||
PHPGurukul User Registration & Login and User Management System | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48279 is considered a high-severity vulnerability due to its potential for remote code execution through HTML injection.
To mitigate CVE-2024-48279, sanitize and validate the input of the 'searchkey' parameter to prevent HTML code injection.
CVE-2024-48279 affects users of PHPGurukul User Registration & Login and User Management System version 3.2.
Attackers can exploit CVE-2024-48279 to execute arbitrary HTML or JavaScript code in the context of the targeted user's browser.
As of now, no official patch has been released for CVE-2024-48279, and users should apply the suggested mitigations.