CVE-2023-36375

5.4 MEDIUM
Published: July 10, 2023 Modified: November 11, 2025

Description

Cross Site Scripting vulnerability in Hostel Management System v2.1 allows an attacker to execute arbitrary code via a crafted payload to the Guardian name, Guardian relation, complimentary address, city, permanent address, and city parameters in the Book Hostel & Room Details page.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://packetstormsecurity.com
Source: cve@mitre.org
Mitigation Third Party Advisory VDB Entry
https://medium.com/%40ridheshgohil1092/cve-2023-36375-xss-on-hostel-management-system-d654e6df26bc
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://packetstormsecurity.com
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Third Party Advisory VDB Entry

5 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.4 / 10.0
EPSS (Exploit Probability)
0.6%
68th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

phpgurukul