Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0642: Cross Site Scripting in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-0642cvecve-2026-0642
Published: Tue Jan 06 2026 (01/06/2026, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

A vulnerability was detected in projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /app/complaint.php. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.

AI-Powered Analysis

AILast updated: 01/14/2026, 01:44:49 UTC

Technical Analysis

CVE-2026-0642 is a cross-site scripting vulnerability identified in version 1.0 of the projectworlds House Rental and Property Listing application. The flaw exists in the processing of the 'Name' parameter within the /app/complaint.php endpoint, where insufficient input validation allows attackers to inject malicious JavaScript code. This vulnerability can be exploited remotely without authentication, but requires user interaction, such as clicking a crafted link or submitting a manipulated form. The CVSS 4.0 score of 4.8 reflects a medium severity level, indicating moderate impact primarily on confidentiality and integrity, with no direct impact on availability. The vulnerability could enable attackers to execute arbitrary scripts in the context of the victim’s browser, leading to session hijacking, defacement, or phishing attacks. Although no exploits are currently observed in the wild, a public exploit is available, increasing the risk of exploitation. The vulnerability does not require privileges or authentication, making it accessible to a wide range of attackers. The lack of vendor patches or official remediation guidance necessitates immediate defensive measures by users of the software. Given the nature of the application—real estate and property listings—attackers could leverage this vulnerability to target users or administrators, potentially compromising sensitive personal or business information.

Potential Impact

For European organizations using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a risk of client-side script injection that can compromise user sessions, steal credentials, or manipulate displayed content. This can lead to reputational damage, loss of customer trust, and potential regulatory penalties under GDPR if personal data is exposed or misused. Real estate platforms often handle sensitive personal and financial information, increasing the stakes of such an attack. The medium severity rating suggests that while the vulnerability is not critical, it can be leveraged as part of a broader attack chain. European organizations with public-facing property listing portals are particularly at risk, especially if they lack robust input validation or web application firewalls. The requirement for user interaction means social engineering or phishing campaigns could be used to exploit this vulnerability, potentially targeting employees or customers. The absence of known active exploitation reduces immediate urgency but does not eliminate the threat, especially given the public availability of exploits.

Mitigation Recommendations

Organizations should implement strict input validation and output encoding on the 'Name' parameter and all user-supplied data to prevent script injection. Deploying a web application firewall (WAF) with rules tailored to detect and block XSS payloads can provide an additional layer of defense. Since no official patches are available, consider isolating or restricting access to the vulnerable complaint.php endpoint where feasible. Conduct security awareness training to educate users about the risks of clicking suspicious links or submitting untrusted data. Regularly monitor logs for unusual activity related to the complaint.php page. If possible, upgrade to a newer, patched version of the software or apply custom patches to sanitize inputs. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Finally, perform periodic security assessments and penetration testing focused on web application vulnerabilities to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T13:55:35.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d904765deeab1b948281c

Added to database: 1/6/2026, 10:44:23 PM

Last enriched: 1/14/2026, 1:44:49 AM

Last updated: 2/7/2026, 5:24:58 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats