CVE-2026-2201: Cross Site Scripting in ZeroWdd studentmanager
A security vulnerability has been detected in ZeroWdd studentmanager up to 2151560fc0a50ec00426785ec1e01a3763b380d9. This impacts the function addLeave of the file src/main/java/com/wdd/studentmanager/controller/LeaveController.java. The manipulation of the argument Reason for Leave leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The code repository of the project has not been active for many years.
AI Analysis
Technical Summary
CVE-2026-2201 identifies a cross-site scripting (XSS) vulnerability in the ZeroWdd studentmanager application, affecting versions up to commit 2151560fc0a50ec00426785ec1e01a3763b380d9. The flaw exists in the addLeave function within the LeaveController.java source file, where the 'Reason for Leave' input parameter is not properly sanitized or encoded before being reflected in the web interface. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser when they view the affected page. The vulnerability can be exploited remotely without authentication, but requires user interaction such as clicking a malicious link or submitting a crafted form. The product follows a rolling release model for updates; however, the code repository has been inactive for years, indicating that official patches or updates may not be forthcoming. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of remote exploitation but limited impact on confidentiality and availability. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface the web interface. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
The primary impact of this XSS vulnerability is on the confidentiality and integrity of user sessions and data within the ZeroWdd studentmanager application. Attackers can execute arbitrary scripts in the context of authenticated users, potentially stealing session tokens, personal information, or performing unauthorized actions. This can lead to account compromise, data leakage, and reputational damage for organizations using the software. Since the application is likely used in educational environments to manage student leave records, exposure could disrupt administrative processes and erode trust. The lack of active maintenance and patch availability increases the risk of prolonged exposure. While availability impact is minimal, the integrity and confidentiality risks are significant enough to warrant attention. Organizations worldwide using this software or its derivatives face potential targeted attacks, especially if attackers craft phishing campaigns exploiting this vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-2201, organizations should implement strict input validation and output encoding on the 'Reason for Leave' parameter to neutralize malicious scripts. Employing context-aware encoding (e.g., HTML entity encoding) before rendering user input in web pages is critical. If source code modification is possible, developers should sanitize inputs using established libraries or frameworks that prevent XSS. Deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide an additional protective layer. Given the inactivity of the official code repository, organizations should consider migrating to actively maintained alternatives or forks. User education to recognize phishing attempts and suspicious links can reduce the risk of exploitation via social engineering. Regular security assessments and penetration testing focused on web application vulnerabilities are recommended. Monitoring logs for unusual input patterns or error messages related to the addLeave function can help detect exploitation attempts early.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Japan
CVE-2026-2201: Cross Site Scripting in ZeroWdd studentmanager
Description
A security vulnerability has been detected in ZeroWdd studentmanager up to 2151560fc0a50ec00426785ec1e01a3763b380d9. This impacts the function addLeave of the file src/main/java/com/wdd/studentmanager/controller/LeaveController.java. The manipulation of the argument Reason for Leave leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The code repository of the project has not been active for many years.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2201 identifies a cross-site scripting (XSS) vulnerability in the ZeroWdd studentmanager application, affecting versions up to commit 2151560fc0a50ec00426785ec1e01a3763b380d9. The flaw exists in the addLeave function within the LeaveController.java source file, where the 'Reason for Leave' input parameter is not properly sanitized or encoded before being reflected in the web interface. This allows an attacker to inject arbitrary JavaScript code that executes in the context of the victim's browser when they view the affected page. The vulnerability can be exploited remotely without authentication, but requires user interaction such as clicking a malicious link or submitting a crafted form. The product follows a rolling release model for updates; however, the code repository has been inactive for years, indicating that official patches or updates may not be forthcoming. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of remote exploitation but limited impact on confidentiality and availability. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or deface the web interface. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts.
Potential Impact
The primary impact of this XSS vulnerability is on the confidentiality and integrity of user sessions and data within the ZeroWdd studentmanager application. Attackers can execute arbitrary scripts in the context of authenticated users, potentially stealing session tokens, personal information, or performing unauthorized actions. This can lead to account compromise, data leakage, and reputational damage for organizations using the software. Since the application is likely used in educational environments to manage student leave records, exposure could disrupt administrative processes and erode trust. The lack of active maintenance and patch availability increases the risk of prolonged exposure. While availability impact is minimal, the integrity and confidentiality risks are significant enough to warrant attention. Organizations worldwide using this software or its derivatives face potential targeted attacks, especially if attackers craft phishing campaigns exploiting this vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-2201, organizations should implement strict input validation and output encoding on the 'Reason for Leave' parameter to neutralize malicious scripts. Employing context-aware encoding (e.g., HTML entity encoding) before rendering user input in web pages is critical. If source code modification is possible, developers should sanitize inputs using established libraries or frameworks that prevent XSS. Deploying a Web Application Firewall (WAF) with rules to detect and block XSS payloads can provide an additional protective layer. Given the inactivity of the official code repository, organizations should consider migrating to actively maintained alternatives or forks. User education to recognize phishing attempts and suspicious links can reduce the risk of exploitation via social engineering. Regular security assessments and penetration testing focused on web application vulnerabilities are recommended. Monitoring logs for unusual input patterns or error messages related to the addLeave function can help detect exploitation attempts early.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-07T17:45:22.766Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69893c684b57a58fa1f0defe
Added to database: 2/9/2026, 1:46:16 AM
Last enriched: 2/23/2026, 9:06:40 PM
Last updated: 3/25/2026, 8:59:30 AM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.