Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0642: Cross Site Scripting in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-0642cvecve-2026-0642
Published: Tue Jan 06 2026 (01/06/2026, 22:32:07 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

A vulnerability was detected in projectworlds House Rental and Property Listing 1.0. This issue affects some unknown processing of the file /app/complaint.php. The manipulation of the argument Name results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:18:27 UTC

Technical Analysis

CVE-2026-0642 identifies a cross-site scripting (XSS) vulnerability in the projectworlds House Rental and Property Listing version 1.0. The issue is located in the /app/complaint.php file, specifically in the processing of the 'Name' argument. Improper input validation allows attackers to inject malicious JavaScript code remotely, which executes in the context of users who interact with the vulnerable parameter. This vulnerability is classified as a reflected or stored XSS depending on how the input is handled, but the description suggests remote exploitation with user interaction. The CVSS 4.0 vector indicates no privileges required (PR:H means high privileges required, but the vector states PR:H, which is contradictory to AT:N and UI:P; assuming the vector is correct, it requires high privileges and user interaction), no confidentiality impact, low integrity impact, and no availability impact. The exploit is publicly known but not yet observed in the wild. The vulnerability could allow attackers to perform session hijacking, defacement, or redirect users to malicious sites, impacting user trust and potentially leading to further attacks. No patches or fixes have been published, so mitigation relies on input sanitization and other defensive coding practices.

Potential Impact

The primary impact of this XSS vulnerability is on the integrity and trustworthiness of the affected web application. Attackers can execute arbitrary scripts in users' browsers, potentially stealing session cookies, performing actions on behalf of users, or redirecting users to malicious websites. This can lead to account compromise, data theft, or reputational damage for organizations using the software. Although the vulnerability does not directly affect system confidentiality or availability, the indirect consequences can be severe, especially if attackers leverage the XSS to escalate attacks. Organizations relying on this software for property listings or rental management may face customer trust erosion and legal liabilities if user data is compromised. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in phishing scenarios.

Mitigation Recommendations

Since no official patches are available, organizations should implement immediate mitigations including: 1) Applying strict input validation and output encoding on the 'Name' parameter in /app/complaint.php to neutralize malicious scripts. 2) Employ Content Security Policy (CSP) headers to restrict script execution sources. 3) Educate users about phishing risks and suspicious links to reduce successful exploitation via user interaction. 4) Monitor web application logs for unusual input patterns targeting the vulnerable parameter. 5) If possible, upgrade to a newer version of the software once a patch is released or consider alternative software solutions with better security posture. 6) Employ web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this endpoint. 7) Conduct regular security assessments and code reviews focusing on input handling.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-06T13:55:35.693Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695d904765deeab1b948281c

Added to database: 1/6/2026, 10:44:23 PM

Last enriched: 2/23/2026, 11:18:27 PM

Last updated: 3/26/2026, 4:31:46 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses