Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2160: Cross Site Scripting in SourceCodester Simple Responsive Tourism Website

0
Medium
VulnerabilityCVE-2026-2160cvecve-2026-2160
Published: Sun Feb 08 2026 (02/08/2026, 15:32:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Simple Responsive Tourism Website

Description

A vulnerability has been found in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /tourism/classes/Master.php?f=save_package. The manipulation of the argument Title leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:38:39 UTC

Technical Analysis

CVE-2026-2160 identifies a cross-site scripting (XSS) vulnerability in the SourceCodester Simple Responsive Tourism Website version 1.0. The vulnerability is located in an unspecified functionality within the /tourism/classes/Master.php file, specifically in the 'save_package' function, where the 'Title' parameter is susceptible to injection of malicious scripts. This improper input validation allows an attacker to craft a payload that, when submitted remotely, can execute arbitrary JavaScript in the context of the victim’s browser. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no authentication (AT:N), but user interaction (UI:P) is necessary to trigger the malicious script. The vulnerability does not compromise the confidentiality of the system directly but can lead to session hijacking, defacement, or phishing attacks, impacting user trust and data integrity. The CVSS 4.0 vector indicates low complexity and no scope change, with a base score of 5.3, categorizing it as medium severity. No patches have been released yet, and no known exploits are actively observed in the wild, though public disclosure increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, which is a web application designed for tourism-related services, likely deployed by small to medium enterprises or tourism agencies. The lack of output encoding or input sanitization in the affected parameter is the root cause. Mitigation requires implementing proper input validation, output encoding, and possibly employing web application firewalls to detect and block malicious payloads.

Potential Impact

The primary impact of CVE-2026-2160 is the potential for attackers to execute arbitrary JavaScript in users’ browsers, leading to session hijacking, theft of sensitive information such as cookies or credentials, and defacement of the affected website. This can erode user trust and damage the reputation of organizations using the vulnerable software. Although the vulnerability does not directly compromise backend systems or data confidentiality at the server level, the indirect effects on user data and integrity can be significant. The requirement for user interaction limits the attack scope but does not eliminate risk, especially in environments with high user traffic or where social engineering can be leveraged. Organizations relying on this tourism website software may face increased phishing risks or unauthorized actions performed in the context of authenticated users. The absence of a patch means the vulnerability may persist until fixed, increasing exposure time. Overall, the impact is moderate but can escalate if combined with other vulnerabilities or poor security practices.

Mitigation Recommendations

To mitigate CVE-2026-2160, organizations should immediately implement strict input validation on the 'Title' parameter within the /tourism/classes/Master.php?f=save_package endpoint, ensuring that all user-supplied data is sanitized to remove or encode potentially malicious characters. Employ context-aware output encoding (e.g., HTML entity encoding) before rendering user inputs in web pages to prevent script execution. If patching is not yet available, consider deploying a web application firewall (WAF) with custom rules to detect and block common XSS payloads targeting this parameter. Conduct thorough code reviews and security testing on all user input handling functions to identify and remediate similar vulnerabilities. Educate users and administrators about the risks of clicking untrusted links or submitting unverified data. Monitor web server logs for suspicious activity related to the vulnerable endpoint. Finally, maintain regular backups and prepare incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T08:55:24.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988afc74b57a58fa1ab2017

Added to database: 2/8/2026, 3:46:15 PM

Last enriched: 2/23/2026, 9:38:39 PM

Last updated: 3/25/2026, 10:08:55 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses