Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1700: Cross Site Scripting in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-1700cvecve-2026-1700
Published: Fri Jan 30 2026 (01/30/2026, 17:02:07 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

A weakness has been identified in projectworlds House Rental and Property Listing 1.0. This vulnerability affects unknown code of the file /app/sms.php. This manipulation of the argument Message causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:53:05 UTC

Technical Analysis

CVE-2026-1700 identifies a Cross Site Scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0. The vulnerability is located in the /app/sms.php file, specifically in the handling of the 'Message' parameter. An attacker can remotely craft malicious input that, when processed by the application, results in the injection and execution of arbitrary JavaScript code in the victim's browser. This type of vulnerability arises due to insufficient input validation or output encoding of user-supplied data before rendering it in a web page. The attack vector is remote and does not require prior authentication, but it requires user interaction, such as clicking a malicious link or viewing a crafted message. The CVSS v4.0 score is 5.1 (medium), reflecting the moderate impact on confidentiality and integrity, limited impact on availability, and the requirement for user interaction. The vulnerability does not affect the system's core security controls but can be leveraged for session hijacking, phishing, or delivering further malware. No official patches have been linked yet, and no active exploitation in the wild has been reported, but a public exploit exists, increasing the urgency for mitigation.

Potential Impact

The primary impact of this vulnerability is the potential execution of arbitrary scripts in users' browsers, which can lead to session hijacking, theft of sensitive information, or redirection to malicious sites. For organizations, this can result in compromised user accounts, loss of customer trust, and potential regulatory penalties if personal data is exposed. Since the vulnerability affects a property listing platform, attackers could target real estate agents, customers, or administrators, potentially disrupting business operations or enabling fraud. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in phishing scenarios. The medium severity rating indicates a moderate risk that can escalate if combined with other vulnerabilities or social engineering tactics. The lack of patches means organizations must rely on workarounds or mitigations until an official fix is released.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the 'Message' parameter in /app/sms.php to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Educate users and administrators about the risks of clicking untrusted links or messages related to the platform. 4. Monitor web application logs for suspicious input patterns targeting the 'Message' parameter. 5. If possible, disable or restrict the functionality that processes the 'Message' parameter until a patch is available. 6. Use web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this endpoint. 7. Regularly update the software once the vendor releases an official patch addressing this vulnerability. 8. Conduct security testing and code reviews focusing on input handling to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T10:50:08.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ce690ac0632022267af13

Added to database: 1/30/2026, 5:12:48 PM

Last enriched: 2/23/2026, 9:53:05 PM

Last updated: 3/24/2026, 5:39:08 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses