Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1154: Basic Cross Site Scripting in SourceCodester E-Learning System

0
Medium
VulnerabilityCVE-2026-1154cvecve-2026-1154
Published: Mon Jan 19 2026 (01/19/2026, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: E-Learning System

Description

A flaw has been found in SourceCodester E-Learning System 1.0. This impacts an unknown function of the file /admin/modules/lesson/index.php of the component Lesson Module Handler. Executing a manipulation of the argument Title/Description can lead to basic cross site scripting. The attack can be executed remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 01/26/2026, 19:52:02 UTC

Technical Analysis

CVE-2026-1154 identifies a basic cross-site scripting (XSS) vulnerability in SourceCodester E-Learning System version 1.0, specifically within the Lesson Module Handler component located at /admin/modules/lesson/index.php. The vulnerability arises from improper sanitization of user-supplied input in the Title and Description parameters, allowing an attacker to inject malicious JavaScript code. When an administrator or user views the manipulated content, the injected script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions within the application. The vulnerability is remotely exploitable without requiring authentication, but user interaction is necessary to trigger the payload, such as clicking a crafted link or viewing a malicious page. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and impacting integrity and confidentiality to a limited extent. No official patches or fixes have been published yet, and no known exploits are reported in the wild, though exploit code is publicly available. This vulnerability highlights the importance of secure input handling in web applications, especially in educational platforms that handle sensitive student and institutional data.

Potential Impact

For European organizations, particularly educational institutions and e-learning providers using SourceCodester E-Learning System 1.0, this vulnerability poses a risk of unauthorized script execution within administrative or user sessions. Successful exploitation could lead to theft of session tokens, unauthorized access to sensitive educational content, manipulation of course materials, or redirection to malicious sites. This compromises the confidentiality and integrity of educational data and user credentials. While availability impact is minimal, the reputational damage and potential regulatory consequences under GDPR for data breaches could be significant. The remote exploitability without authentication increases the attack surface, especially in environments where administrators access the system from less secure networks. The requirement for user interaction somewhat limits automated exploitation but does not eliminate risk, as phishing or social engineering could be used to trigger the attack.

Mitigation Recommendations

European organizations should implement strict input validation and output encoding on all user-supplied data, especially in the Title and Description fields of the Lesson Module Handler. Employ Content Security Policy (CSP) headers to restrict script execution sources and reduce XSS impact. Monitor and restrict administrative access to trusted networks and use multi-factor authentication to reduce session hijacking risks. Regularly audit and sanitize stored content to detect and remove injected scripts. Since no official patch is currently available, consider isolating or disabling vulnerable modules until a fix is released. Educate administrators and users about phishing risks and suspicious links to mitigate user interaction exploitation. Implement web application firewalls (WAF) with XSS detection rules tailored to this vulnerability. Finally, maintain an incident response plan to quickly address any detected exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-18T14:05:08.785Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e2a0dd302b072d9befabf

Added to database: 1/19/2026, 12:56:45 PM

Last enriched: 1/26/2026, 7:52:02 PM

Last updated: 2/7/2026, 4:26:49 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats