Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1700: Cross Site Scripting in projectworlds House Rental and Property Listing

0
Medium
VulnerabilityCVE-2026-1700cvecve-2026-1700
Published: Fri Jan 30 2026 (01/30/2026, 17:02:07 UTC)
Source: CVE Database V5
Vendor/Project: projectworlds
Product: House Rental and Property Listing

Description

CVE-2026-1700 is a medium-severity Cross Site Scripting (XSS) vulnerability found in version 1. 0 of projectworlds House Rental and Property Listing software. The vulnerability exists in the /app/sms. php file where the 'Message' parameter is improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction, such as a victim clicking a crafted link or viewing a manipulated message. While no known exploits are currently active in the wild, proof-of-concept code has been publicly disclosed, increasing the risk of attacks. This vulnerability can lead to theft of user credentials, session hijacking, or defacement of web content. European organizations using this software, especially in real estate sectors, should prioritize patching or mitigating this issue. Countries with higher adoption of projectworlds solutions or significant real estate markets are more likely to be affected. Mitigation includes input validation, output encoding, and deploying web application firewalls with XSS protections.

AI-Powered Analysis

AILast updated: 01/30/2026, 17:27:06 UTC

Technical Analysis

CVE-2026-1700 identifies a Cross Site Scripting (XSS) vulnerability in projectworlds House Rental and Property Listing version 1.0, specifically within the /app/sms.php file. The vulnerability arises due to insufficient sanitization of the 'Message' parameter, which allows an attacker to inject malicious JavaScript code into the web application. When a victim interacts with the crafted input—such as viewing a manipulated message—the malicious script executes in their browser context. This can lead to unauthorized actions like session hijacking, credential theft, or unauthorized redirection. The vulnerability is remotely exploitable without requiring authentication, though user interaction is necessary to trigger the payload. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P). The vulnerability does not affect confidentiality or availability directly but impacts integrity and user trust. Although no active exploits are reported in the wild, public availability of exploit code increases the risk of exploitation. No official patches or vendor advisories are currently listed, which necessitates immediate mitigation efforts by users of this software.

Potential Impact

For European organizations, especially those in the real estate and property management sectors using projectworlds House Rental and Property Listing 1.0, this vulnerability poses a risk of client-side attacks that can compromise user accounts and data integrity. Attackers could leverage XSS to steal session cookies, perform phishing attacks, or deface web content, potentially damaging organizational reputation and user trust. Given the nature of the software, which likely handles sensitive client information and communications, exploitation could lead to unauthorized access to personal data or manipulation of property listings. The medium severity suggests moderate impact, but the ease of remote exploitation and public exploit availability increase urgency. Organizations without adequate input validation or web security controls are at higher risk. The vulnerability could also be leveraged as a foothold for further attacks within the network if combined with other vulnerabilities.

Mitigation Recommendations

1. Implement strict input validation and sanitization on the 'Message' parameter in /app/sms.php to neutralize malicious scripts. 2. Apply output encoding on all user-supplied data before rendering it in the browser to prevent script execution. 3. Deploy a Web Application Firewall (WAF) with rules specifically targeting XSS attack patterns to block malicious payloads. 4. Educate end-users about the risks of clicking unknown links or interacting with suspicious messages to reduce successful exploitation. 5. Monitor web application logs for unusual input patterns or repeated attempts to exploit the 'Message' parameter. 6. If possible, upgrade to a patched version once available or consider alternative software solutions with better security posture. 7. Conduct regular security assessments and penetration tests focusing on input handling and client-side vulnerabilities. 8. Use Content Security Policy (CSP) headers to restrict the execution of untrusted scripts in the browser environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-30T10:50:08.383Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ce690ac0632022267af13

Added to database: 1/30/2026, 5:12:48 PM

Last enriched: 1/30/2026, 5:27:06 PM

Last updated: 1/30/2026, 6:17:16 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats