CVE-2026-2160: Cross Site Scripting in SourceCodester Simple Responsive Tourism Website
CVE-2026-2160 is a medium severity cross-site scripting (XSS) vulnerability in SourceCodester Simple Responsive Tourism Website version 1. 0. The flaw exists in the /tourism/classes/Master. php? f=save_package endpoint, where the Title parameter is improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction to trigger the payload. While no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 score is 5. 3, reflecting moderate impact primarily on confidentiality and integrity through potential session hijacking or defacement.
AI Analysis
Technical Summary
CVE-2026-2160 is a cross-site scripting vulnerability identified in version 1.0 of the SourceCodester Simple Responsive Tourism Website. The vulnerability resides in the handling of the Title parameter within the /tourism/classes/Master.php?f=save_package endpoint. Due to insufficient input sanitization, an attacker can inject malicious JavaScript code that executes in the context of the victim's browser when the crafted input is rendered. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without requiring authentication, but user interaction is necessary to trigger the malicious script. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction required for the attack initiation (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L). Although no public exploits are currently known to be in the wild, the public disclosure increases the risk of exploitation by opportunistic attackers. The affected product is a niche tourism website solution, which may be used by small to medium enterprises in the tourism sector. The lack of available patches or updates necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, the impact of this XSS vulnerability can be significant, particularly for those operating tourism-related websites or services using the affected SourceCodester product. Exploitation could lead to theft of session cookies, enabling attackers to impersonate legitimate users, potentially accessing sensitive customer data or administrative functions. This could result in reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could deface websites or redirect visitors to malicious sites, harming business operations and customer experience. Given the tourism sector's importance in many European economies, especially in countries like Spain, Italy, and France, successful exploitation could disrupt business continuity and impact revenue. The vulnerability's medium severity reflects moderate risk, but the ease of remote exploitation without authentication increases its attractiveness to attackers.
Mitigation Recommendations
To mitigate CVE-2026-2160, organizations should implement strict input validation on the Title parameter to ensure that no executable scripts can be injected. Employing server-side sanitization libraries that neutralize HTML and JavaScript content is critical. Additionally, output encoding should be applied when rendering user-supplied data to prevent script execution in browsers. Implementing a robust Content Security Policy (CSP) can further reduce the risk by restricting the sources from which scripts can be loaded and executed. Organizations should monitor web application logs for suspicious input patterns and consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads. Since no official patches are currently available, these mitigations are essential interim controls. Finally, educating web developers on secure coding practices and conducting regular security assessments of web applications will help prevent similar vulnerabilities.
Affected Countries
Spain, Italy, France, Germany, United Kingdom
CVE-2026-2160: Cross Site Scripting in SourceCodester Simple Responsive Tourism Website
Description
CVE-2026-2160 is a medium severity cross-site scripting (XSS) vulnerability in SourceCodester Simple Responsive Tourism Website version 1. 0. The flaw exists in the /tourism/classes/Master. php? f=save_package endpoint, where the Title parameter is improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction to trigger the payload. While no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 score is 5. 3, reflecting moderate impact primarily on confidentiality and integrity through potential session hijacking or defacement.
AI-Powered Analysis
Technical Analysis
CVE-2026-2160 is a cross-site scripting vulnerability identified in version 1.0 of the SourceCodester Simple Responsive Tourism Website. The vulnerability resides in the handling of the Title parameter within the /tourism/classes/Master.php?f=save_package endpoint. Due to insufficient input sanitization, an attacker can inject malicious JavaScript code that executes in the context of the victim's browser when the crafted input is rendered. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without requiring authentication, but user interaction is necessary to trigger the malicious script. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction required for the attack initiation (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L). Although no public exploits are currently known to be in the wild, the public disclosure increases the risk of exploitation by opportunistic attackers. The affected product is a niche tourism website solution, which may be used by small to medium enterprises in the tourism sector. The lack of available patches or updates necessitates immediate mitigation efforts by affected organizations.
Potential Impact
For European organizations, the impact of this XSS vulnerability can be significant, particularly for those operating tourism-related websites or services using the affected SourceCodester product. Exploitation could lead to theft of session cookies, enabling attackers to impersonate legitimate users, potentially accessing sensitive customer data or administrative functions. This could result in reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could deface websites or redirect visitors to malicious sites, harming business operations and customer experience. Given the tourism sector's importance in many European economies, especially in countries like Spain, Italy, and France, successful exploitation could disrupt business continuity and impact revenue. The vulnerability's medium severity reflects moderate risk, but the ease of remote exploitation without authentication increases its attractiveness to attackers.
Mitigation Recommendations
To mitigate CVE-2026-2160, organizations should implement strict input validation on the Title parameter to ensure that no executable scripts can be injected. Employing server-side sanitization libraries that neutralize HTML and JavaScript content is critical. Additionally, output encoding should be applied when rendering user-supplied data to prevent script execution in browsers. Implementing a robust Content Security Policy (CSP) can further reduce the risk by restricting the sources from which scripts can be loaded and executed. Organizations should monitor web application logs for suspicious input patterns and consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads. Since no official patches are currently available, these mitigations are essential interim controls. Finally, educating web developers on secure coding practices and conducting regular security assessments of web applications will help prevent similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T08:55:24.999Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6988afc74b57a58fa1ab2017
Added to database: 2/8/2026, 3:46:15 PM
Last enriched: 2/8/2026, 4:00:45 PM
Last updated: 2/8/2026, 5:10:40 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2165: Missing Authentication in detronetdip E-commerce
MediumCVE-2026-2164: Unrestricted Upload in detronetdip E-commerce
MediumCVE-2026-2163: Command Injection in D-Link DIR-600
MediumCVE-2026-2162: SQL Injection in itsourcecode News Portal Project
MediumCVE-2026-2161: SQL Injection in itsourcecode Directory Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.