CVE-2026-0642: Cross Site Scripting in projectworlds House Rental and Property Listing
A vulnerability was detected in projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /app/complaint.php. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2026-0642 identifies a cross-site scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0, specifically within the /app/complaint.php file. The vulnerability stems from inadequate sanitization of the 'Name' parameter, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to craft URLs or input data that, when processed by the vulnerable application and viewed by users, execute arbitrary scripts in the victim's browser context. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:H indicates high privileges required, but CVSS vector states PR:H which conflicts with description; assuming no privileges required based on typical XSS), and user interaction (UI:P) to trigger the payload. The impact primarily affects confidentiality and integrity by enabling session hijacking, cookie theft, or phishing via script injection. Availability is not impacted. The vulnerability is rated medium severity with a CVSS 4.8 score, reflecting moderate risk due to the need for user interaction and limited impact scope. No patches or fixes are currently linked, and no known exploits are active in the wild, though the exploit code is publicly available. This vulnerability is significant for organizations using this software in their web infrastructure, as it can undermine user trust and lead to further compromise if exploited.
Potential Impact
For European organizations, the impact of CVE-2026-0642 can be significant in sectors relying on the projectworlds House Rental and Property Listing software, such as real estate agencies and property management firms. Successful exploitation could lead to theft of user credentials, session hijacking, and phishing attacks targeting customers or employees, potentially resulting in unauthorized access to sensitive data or fraudulent transactions. This could damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause financial losses. Although the vulnerability does not directly affect system availability, the indirect consequences of compromised user accounts and data integrity can disrupt business operations. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns could be effective. The lack of an official patch increases the urgency for interim mitigations. Organizations with public-facing instances of this software are at higher risk, especially if they have a large user base or handle sensitive personal data.
Mitigation Recommendations
To mitigate CVE-2026-0642, organizations should implement strict input validation and output encoding on the 'Name' parameter within /app/complaint.php to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct thorough code reviews and apply web application firewalls (WAF) with rules targeting XSS payloads to detect and block exploit attempts. Educate users about the risks of clicking unknown or suspicious links, especially those related to complaint submissions or property listings. If possible, isolate or sandbox the affected application to limit potential damage. Monitor logs for unusual activity indicative of XSS exploitation attempts. Engage with the vendor or community to obtain or develop patches and apply them promptly once available. Consider migrating to alternative software solutions if timely remediation is not feasible. Regularly update and audit web application security controls to prevent similar vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2026-0642: Cross Site Scripting in projectworlds House Rental and Property Listing
Description
A vulnerability was detected in projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /app/complaint.php. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-0642 identifies a cross-site scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0, specifically within the /app/complaint.php file. The vulnerability stems from inadequate sanitization of the 'Name' parameter, which can be manipulated by an attacker to inject malicious JavaScript code. This flaw allows remote attackers to craft URLs or input data that, when processed by the vulnerable application and viewed by users, execute arbitrary scripts in the victim's browser context. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:H indicates high privileges required, but CVSS vector states PR:H which conflicts with description; assuming no privileges required based on typical XSS), and user interaction (UI:P) to trigger the payload. The impact primarily affects confidentiality and integrity by enabling session hijacking, cookie theft, or phishing via script injection. Availability is not impacted. The vulnerability is rated medium severity with a CVSS 4.8 score, reflecting moderate risk due to the need for user interaction and limited impact scope. No patches or fixes are currently linked, and no known exploits are active in the wild, though the exploit code is publicly available. This vulnerability is significant for organizations using this software in their web infrastructure, as it can undermine user trust and lead to further compromise if exploited.
Potential Impact
For European organizations, the impact of CVE-2026-0642 can be significant in sectors relying on the projectworlds House Rental and Property Listing software, such as real estate agencies and property management firms. Successful exploitation could lead to theft of user credentials, session hijacking, and phishing attacks targeting customers or employees, potentially resulting in unauthorized access to sensitive data or fraudulent transactions. This could damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and cause financial losses. Although the vulnerability does not directly affect system availability, the indirect consequences of compromised user accounts and data integrity can disrupt business operations. The requirement for user interaction limits mass exploitation but targeted spear-phishing campaigns could be effective. The lack of an official patch increases the urgency for interim mitigations. Organizations with public-facing instances of this software are at higher risk, especially if they have a large user base or handle sensitive personal data.
Mitigation Recommendations
To mitigate CVE-2026-0642, organizations should implement strict input validation and output encoding on the 'Name' parameter within /app/complaint.php to neutralize malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct thorough code reviews and apply web application firewalls (WAF) with rules targeting XSS payloads to detect and block exploit attempts. Educate users about the risks of clicking unknown or suspicious links, especially those related to complaint submissions or property listings. If possible, isolate or sandbox the affected application to limit potential damage. Monitor logs for unusual activity indicative of XSS exploitation attempts. Engage with the vendor or community to obtain or develop patches and apply them promptly once available. Consider migrating to alternative software solutions if timely remediation is not feasible. Regularly update and audit web application security controls to prevent similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-06T13:55:35.693Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695d904765deeab1b948281c
Added to database: 1/6/2026, 10:44:23 PM
Last enriched: 1/6/2026, 10:58:45 PM
Last updated: 1/8/2026, 2:27:34 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.