Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1444: Cross Site Scripting in iJason-Liu Books_Manager

0
Medium
VulnerabilityCVE-2026-1444cvecve-2026-1444
Published: Mon Jan 26 2026 (01/26/2026, 21:32:05 UTC)
Source: CVE Database V5
Vendor/Project: iJason-Liu
Product: Books_Manager

Description

A vulnerability has been found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This affects an unknown part of the file controllers/books_center/add_book_check.php. Such manipulation of the argument mark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:29:51 UTC

Technical Analysis

CVE-2026-1444 identifies a cross-site scripting vulnerability in the iJason-Liu Books_Manager software, affecting the add_book_check.php file, specifically through the 'mark' parameter. This vulnerability allows an attacker to inject malicious scripts that execute in the context of the victim's browser when they interact with crafted input. The flaw stems from insufficient input validation or output encoding, enabling script injection. The attack vector is network-based, requiring no authentication but user interaction to trigger the malicious payload. The vulnerability has been publicly disclosed, but no confirmed active exploitation has been reported. The software does not use versioning, making it difficult to determine all affected instances. The CVSS 4.0 vector indicates low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects confidentiality and integrity by potentially stealing session tokens or manipulating page content, with no direct availability impact. The lack of patch links suggests that no official fix has been released yet, increasing the urgency for organizations to implement mitigations.

Potential Impact

This XSS vulnerability can lead to theft of sensitive user information such as session cookies, credentials, or personal data, enabling account hijacking or unauthorized actions within the Books_Manager application. It can also facilitate phishing attacks by injecting deceptive content or redirecting users to malicious sites. For organizations, this can result in data breaches, loss of user trust, and potential regulatory penalties if personal data is compromised. Since the vulnerability requires user interaction, the scope is somewhat limited but remains significant in environments where users frequently interact with the affected application. The absence of versioning and patches increases the risk of prolonged exposure. Attackers could leverage this vulnerability as an initial foothold or part of a broader attack chain, especially in organizations relying heavily on this software for book management or related workflows.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on the 'mark' parameter and any other user-supplied inputs within the Books_Manager application to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Conduct thorough code reviews focusing on input handling in add_book_check.php and related modules. If possible, isolate or restrict access to the Books_Manager application to trusted users and networks until a vendor patch is available. Educate users about the risks of clicking on suspicious links or inputs within the application. Monitor web application logs for unusual input patterns or attempted script injections. Consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads specific to this vulnerability. Engage with the vendor or community to track patch releases and apply updates promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-26T14:53:34.103Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69790cec4623b1157c4004a7

Added to database: 1/27/2026, 7:07:24 PM

Last enriched: 2/23/2026, 10:29:51 PM

Last updated: 3/23/2026, 9:41:40 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses