CVE-2026-1700: Cross Site Scripting in projectworlds House Rental and Property Listing
A weakness has been identified in projectworlds House Rental and Property Listing 1.0. This vulnerability affects unknown code of the file /app/sms.php. This manipulation of the argument Message causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2026-1700 identifies a Cross Site Scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0, specifically within the /app/sms.php file. The vulnerability arises due to insufficient sanitization of the 'Message' parameter, which allows an attacker to inject malicious JavaScript code into the web application. When a victim interacts with the crafted input—such as viewing a manipulated message—the malicious script executes in their browser context. This can lead to unauthorized actions like session hijacking, credential theft, or unauthorized redirection. The vulnerability is remotely exploitable without requiring authentication, though user interaction is necessary to trigger the payload. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The vulnerability does not affect confidentiality or availability directly but impacts integrity and user trust. Although no active exploits are reported in the wild, public availability of exploit code increases the risk of exploitation. No official patches or vendor advisories are currently listed, which necessitates immediate mitigation efforts by users of this software.
Potential Impact
For European organizations, especially those in the real estate and property management sectors using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a risk of client-side attacks that can compromise user accounts and data integrity. Attackers could leverage XSS to steal session cookies, perform phishing attacks, or deface web content, potentially damaging organizational reputation and user trust. Given the nature of the software, which likely handles sensitive client information and communications, exploitation could lead to unauthorized access to personal data or manipulation of property listings. The medium severity suggests moderate impact, but the ease of remote exploitation and public exploit availability increase urgency. Organizations without adequate input validation or web security controls are at higher risk. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the 'Message' parameter in /app/sms.php to neutralize malicious scripts. 2. Apply output encoding on all user-supplied data before rendering it in the browser to prevent script execution. 3. Deploy a Web Application Firewall (WAF) with rules specifically targeting XSS attack patterns to block malicious payloads. 4. Educate end-users about the risks of clicking unknown links or interacting with suspicious messages to reduce successful exploitation. 5. Monitor web application logs for unusual input patterns or repeated attempts to exploit the 'Message' parameter. 6. If possible, upgrade to a patched version once available or consider alternative software solutions with better security posture. 7. Conduct regular security assessments and penetration tests focusing on input handling and client-side vulnerabilities. 8. Use Content Security Policy (CSP) headers to restrict the execution of untrusted scripts in the browser environment.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-1700: Cross Site Scripting in projectworlds House Rental and Property Listing
Description
A weakness has been identified in projectworlds House Rental and Property Listing 1.0. This vulnerability affects unknown code of the file /app/sms.php. This manipulation of the argument Message causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Technical Analysis
CVE-2026-1700 identifies a Cross Site Scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0, specifically within the /app/sms.php file. The vulnerability arises due to insufficient sanitization of the 'Message' parameter, which allows an attacker to inject malicious JavaScript code into the web application. When a victim interacts with the crafted input—such as viewing a manipulated message—the malicious script executes in their browser context. This can lead to unauthorized actions like session hijacking, credential theft, or unauthorized redirection. The vulnerability is remotely exploitable without requiring authentication, though user interaction is necessary to trigger the payload. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The vulnerability does not affect confidentiality or availability directly but impacts integrity and user trust. Although no active exploits are reported in the wild, public availability of exploit code increases the risk of exploitation. No official patches or vendor advisories are currently listed, which necessitates immediate mitigation efforts by users of this software.
Potential Impact
For European organizations, especially those in the real estate and property management sectors using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a risk of client-side attacks that can compromise user accounts and data integrity. Attackers could leverage XSS to steal session cookies, perform phishing attacks, or deface web content, potentially damaging organizational reputation and user trust. Given the nature of the software, which likely handles sensitive client information and communications, exploitation could lead to unauthorized access to personal data or manipulation of property listings. The medium severity suggests moderate impact, but the ease of remote exploitation and public exploit availability increase urgency. Organizations without adequate input validation or web security controls are at higher risk. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities.
Mitigation Recommendations
1. Implement strict input validation and sanitization on the 'Message' parameter in /app/sms.php to neutralize malicious scripts. 2. Apply output encoding on all user-supplied data before rendering it in the browser to prevent script execution. 3. Deploy a Web Application Firewall (WAF) with rules specifically targeting XSS attack patterns to block malicious payloads. 4. Educate end-users about the risks of clicking unknown links or interacting with suspicious messages to reduce successful exploitation. 5. Monitor web application logs for unusual input patterns or repeated attempts to exploit the 'Message' parameter. 6. If possible, upgrade to a patched version once available or consider alternative software solutions with better security posture. 7. Conduct regular security assessments and penetration tests focusing on input handling and client-side vulnerabilities. 8. Use Content Security Policy (CSP) headers to restrict the execution of untrusted scripts in the browser environment.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-30T10:50:08.383Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697ce690ac0632022267af13
Added to database: 1/30/2026, 5:12:48 PM
Last enriched: 1/30/2026, 5:27:06 PM
Last updated: 2/6/2026, 2:29:41 PM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2056: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.