A cross-site scripting (XSS) vulnerability exists in the search-autootaxi.php endpoint of the ATSMS web application. The application fails to properly sanitize user input submitted through a form field, allowing an attacker to inject arbitrary JavaScript code. The malicious payload is stored in the backend and executed when a user or administrator accesses the affected report page. This allows attackers to exfiltrate session cookies, hijack user sessions, and perform unauthorized actions in the context of the victims browser.
References
| Link | Resource |
|---|---|
| http://auto.com | Not Applicable |
| http://phpgurukul.com | Product |
| https://github.com/nandanacp/CVE-Collection/blob/main/CVE-2025-57145/README.md | Third Party Advisory |
| https://github.com/nandanacp/CVE-Collection/blob/main/CVE-2025-57145/README.md | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-16 15:15
Updated : 2025-10-08 19:25
NVD link : CVE-2025-57145
Mitre link : CVE-2025-57145
CVE.ORG link : CVE-2025-57145
JSON object : View
Products Affected
phpgurukul
- auto_taxi_stand_management_system
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
