/

CVE-2023-1948 Report - Details, Severity, & Advisories

CVE-2023-1948 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-1948 is a vulnerability found in PHPGurukul BP Monitoring Management System 1.0, specifically affecting the Add New Family Member Handler component. This issue, classified as problematic, involves cross-site scripting due to the manipulation of the Member Name argument in the add-family-member.php file. The vulnerability has a severity rating of 6.1 MEDIUM by NIST and 3.5 LOW by VulDB according to CVSS 3.x. The exploit has been disclosed to the public and may be used, impacting the integrity of the affected systems.

How do I know if I'm affected?

To determine if you're affected by the CVE-2023-1948 vulnerability, check if you're using PHPGurukul BP Monitoring Management System 1.0. The vulnerability specifically impacts the Add New Family Member Handler component, where manipulation of the member name argument in the add-family-member.php file can lead to cross-site scripting. If you're using this version of the software, you may be at risk. No information about affected Apple product versions is available.

What should I do if I'm affected?

If you're affected by the this vulnerability, it's important to take action to protect your system. Unfortunately, there's no known mitigation for this issue. As a precaution, consider replacing the affected software with an alternative product to minimize potential risks. Stay informed about updates and patches that may address this vulnerability in the future.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

As of now, CVE-2023-1948 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This vulnerability, found in PHPGurukul BP Monitoring Management System 1.0, affects the Add New Family Member functionality and involves cross-site scripting. The issue was published on April 8, 2023, but there is no due date or required action specified for addressing it. It's important to stay informed about updates and patches that may help resolve this vulnerability in the future.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 is a cross-site scripting vulnerability in PHPGurukul BP Monitoring Management System's Add New Family Member feature, caused by improper input neutralization.

For more details

For a comprehensive understanding of this issue, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2023-1948 Report - Details, Severity, & Advisories

CVE-2023-1948 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-1948 is a vulnerability found in PHPGurukul BP Monitoring Management System 1.0, specifically affecting the Add New Family Member Handler component. This issue, classified as problematic, involves cross-site scripting due to the manipulation of the Member Name argument in the add-family-member.php file. The vulnerability has a severity rating of 6.1 MEDIUM by NIST and 3.5 LOW by VulDB according to CVSS 3.x. The exploit has been disclosed to the public and may be used, impacting the integrity of the affected systems.

How do I know if I'm affected?

To determine if you're affected by the CVE-2023-1948 vulnerability, check if you're using PHPGurukul BP Monitoring Management System 1.0. The vulnerability specifically impacts the Add New Family Member Handler component, where manipulation of the member name argument in the add-family-member.php file can lead to cross-site scripting. If you're using this version of the software, you may be at risk. No information about affected Apple product versions is available.

What should I do if I'm affected?

If you're affected by the this vulnerability, it's important to take action to protect your system. Unfortunately, there's no known mitigation for this issue. As a precaution, consider replacing the affected software with an alternative product to minimize potential risks. Stay informed about updates and patches that may address this vulnerability in the future.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

As of now, CVE-2023-1948 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This vulnerability, found in PHPGurukul BP Monitoring Management System 1.0, affects the Add New Family Member functionality and involves cross-site scripting. The issue was published on April 8, 2023, but there is no due date or required action specified for addressing it. It's important to stay informed about updates and patches that may help resolve this vulnerability in the future.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 is a cross-site scripting vulnerability in PHPGurukul BP Monitoring Management System's Add New Family Member feature, caused by improper input neutralization.

For more details

For a comprehensive understanding of this issue, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2023-1948 Report - Details, Severity, & Advisories

Twingate Team

May 13, 2024

CVE-2023-1948 is a vulnerability found in PHPGurukul BP Monitoring Management System 1.0, specifically affecting the Add New Family Member Handler component. This issue, classified as problematic, involves cross-site scripting due to the manipulation of the Member Name argument in the add-family-member.php file. The vulnerability has a severity rating of 6.1 MEDIUM by NIST and 3.5 LOW by VulDB according to CVSS 3.x. The exploit has been disclosed to the public and may be used, impacting the integrity of the affected systems.

How do I know if I'm affected?

To determine if you're affected by the CVE-2023-1948 vulnerability, check if you're using PHPGurukul BP Monitoring Management System 1.0. The vulnerability specifically impacts the Add New Family Member Handler component, where manipulation of the member name argument in the add-family-member.php file can lead to cross-site scripting. If you're using this version of the software, you may be at risk. No information about affected Apple product versions is available.

What should I do if I'm affected?

If you're affected by the this vulnerability, it's important to take action to protect your system. Unfortunately, there's no known mitigation for this issue. As a precaution, consider replacing the affected software with an alternative product to minimize potential risks. Stay informed about updates and patches that may address this vulnerability in the future.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

As of now, CVE-2023-1948 is not listed in CISA's Known Exploited Vulnerabilities Catalog. This vulnerability, found in PHPGurukul BP Monitoring Management System 1.0, affects the Add New Family Member functionality and involves cross-site scripting. The issue was published on April 8, 2023, but there is no due date or required action specified for addressing it. It's important to stay informed about updates and patches that may help resolve this vulnerability in the future.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-79 is a cross-site scripting vulnerability in PHPGurukul BP Monitoring Management System's Add New Family Member feature, caused by improper input neutralization.

For more details

For a comprehensive understanding of this issue, including its description, severity, technical details, and known affected software configurations, refer to the NVD or the links provided below.