Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2160: Cross Site Scripting in SourceCodester Simple Responsive Tourism Website

0
Medium
VulnerabilityCVE-2026-2160cvecve-2026-2160
Published: Sun Feb 08 2026 (02/08/2026, 15:32:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Simple Responsive Tourism Website

Description

CVE-2026-2160 is a medium severity cross-site scripting (XSS) vulnerability in SourceCodester Simple Responsive Tourism Website version 1. 0. The flaw exists in the /tourism/classes/Master. php? f=save_package endpoint, where the Title parameter is improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction to trigger the payload. While no known exploits are currently in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation. The CVSS 4. 0 score is 5. 3, reflecting moderate impact primarily on confidentiality and integrity through potential session hijacking or defacement.

AI-Powered Analysis

AILast updated: 02/08/2026, 16:00:45 UTC

Technical Analysis

CVE-2026-2160 is a cross-site scripting vulnerability identified in version 1.0 of the SourceCodester Simple Responsive Tourism Website. The vulnerability resides in the handling of the Title parameter within the /tourism/classes/Master.php?f=save_package endpoint. Due to insufficient input sanitization, an attacker can inject malicious JavaScript code that executes in the context of the victim's browser when the crafted input is rendered. This type of vulnerability enables attackers to perform actions such as session hijacking, defacement, or redirecting users to malicious sites. The vulnerability is remotely exploitable without requiring authentication, but user interaction is necessary to trigger the malicious script. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction required for the attack initiation (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L). Although no public exploits are currently known to be in the wild, the public disclosure increases the risk of exploitation by opportunistic attackers. The affected product is a niche tourism website solution, which may be used by small to medium enterprises in the tourism sector. The lack of available patches or updates necessitates immediate mitigation efforts by affected organizations.

Potential Impact

For European organizations, the impact of this XSS vulnerability can be significant, particularly for those operating tourism-related websites or services using the affected SourceCodester product. Exploitation could lead to theft of session cookies, enabling attackers to impersonate legitimate users, potentially accessing sensitive customer data or administrative functions. This could result in reputational damage, loss of customer trust, and regulatory penalties under GDPR if personal data is compromised. Additionally, attackers could deface websites or redirect visitors to malicious sites, harming business operations and customer experience. Given the tourism sector's importance in many European economies, especially in countries like Spain, Italy, and France, successful exploitation could disrupt business continuity and impact revenue. The vulnerability's medium severity reflects moderate risk, but the ease of remote exploitation without authentication increases its attractiveness to attackers.

Mitigation Recommendations

To mitigate CVE-2026-2160, organizations should implement strict input validation on the Title parameter to ensure that no executable scripts can be injected. Employing server-side sanitization libraries that neutralize HTML and JavaScript content is critical. Additionally, output encoding should be applied when rendering user-supplied data to prevent script execution in browsers. Implementing a robust Content Security Policy (CSP) can further reduce the risk by restricting the sources from which scripts can be loaded and executed. Organizations should monitor web application logs for suspicious input patterns and consider deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads. Since no official patches are currently available, these mitigations are essential interim controls. Finally, educating web developers on secure coding practices and conducting regular security assessments of web applications will help prevent similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T08:55:24.999Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6988afc74b57a58fa1ab2017

Added to database: 2/8/2026, 3:46:15 PM

Last enriched: 2/8/2026, 4:00:45 PM

Last updated: 2/8/2026, 5:10:40 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats