Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2201: Cross Site Scripting in ZeroWdd studentmanager

0
Medium
VulnerabilityCVE-2026-2201cvecve-2026-2201
Published: Mon Feb 09 2026 (02/09/2026, 01:02:09 UTC)
Source: CVE Database V5
Vendor/Project: ZeroWdd
Product: studentmanager

Description

CVE-2026-2201 is a medium severity cross-site scripting (XSS) vulnerability found in the ZeroWdd studentmanager application, specifically in the addLeave function of LeaveController. java. The vulnerability arises from improper sanitization of the 'Reason for Leave' parameter, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction, such as a victim clicking a crafted link or submitting malicious input. The product is no longer actively maintained, increasing risk for unpatched deployments. Although no known exploits are currently in the wild, public disclosure means attackers could develop exploits. The vulnerability impacts confidentiality and integrity by enabling script injection, potentially leading to session hijacking or data manipulation. European organizations using this software, especially educational institutions, should prioritize mitigation due to the risk of targeted attacks. Mitigations include input validation, output encoding, and deploying web application firewalls. Countries with higher adoption of this software or with strategic educational sectors are more likely to be affected.

AI-Powered Analysis

AILast updated: 02/09/2026, 02:00:36 UTC

Technical Analysis

CVE-2026-2201 is a cross-site scripting vulnerability identified in the ZeroWdd studentmanager software, specifically affecting the addLeave function within the LeaveController.java file. The vulnerability stems from insufficient input validation or sanitization of the 'Reason for Leave' parameter, which is susceptible to malicious script injection. An attacker can remotely exploit this flaw by crafting input that, when processed and rendered by the application, executes arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability does not require authentication but does require user interaction, such as clicking a malicious link or submitting a form with the crafted payload. The software follows a rolling release model but has not been actively maintained for years, meaning no official patches or updates are available to address this issue. The CVSS 4.0 score of 4.8 reflects a medium severity, considering the ease of remote exploitation but limited impact on availability and the requirement for user interaction. The lack of recent updates increases the risk for organizations still running this software, as the vulnerability remains unpatched and publicly disclosed. No known exploits are currently reported in the wild, but public disclosure raises the likelihood of future exploitation attempts.

Potential Impact

For European organizations, particularly educational institutions using ZeroWdd studentmanager, this vulnerability poses a risk to the confidentiality and integrity of user data. Successful exploitation could allow attackers to execute malicious scripts in users' browsers, potentially leading to session hijacking, unauthorized data access, or manipulation of student leave records. This could undermine trust in the institution's data handling and lead to regulatory compliance issues under GDPR due to unauthorized data exposure. The lack of active maintenance means organizations cannot rely on vendor patches and must implement compensating controls. The attack vector is remote and requires user interaction, which could be facilitated through phishing campaigns targeting staff or students. The impact on availability is minimal, but the potential for reputational damage and data breaches is significant. Given the public disclosure and absence of patches, the window for exploitation is open, increasing the urgency for mitigation.

Mitigation Recommendations

European organizations should immediately audit their use of ZeroWdd studentmanager to identify affected instances. Since no official patches are available due to discontinued maintenance, organizations must implement compensating controls. These include rigorous input validation and output encoding on the 'Reason for Leave' field to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can help restrict script execution in browsers. Deploying Web Application Firewalls (WAFs) with rules targeting XSS payloads can provide an additional layer of defense. User awareness training to recognize phishing attempts and suspicious links is critical to reduce the risk of user interaction exploitation. If feasible, migrating to alternative actively maintained student management systems should be considered to eliminate exposure. Regular security assessments and monitoring for anomalous activities related to this application are also recommended. Finally, organizations should ensure compliance with data protection regulations by documenting risk acceptance or mitigation steps.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-07T17:45:22.766Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69893c684b57a58fa1f0defe

Added to database: 2/9/2026, 1:46:16 AM

Last enriched: 2/9/2026, 2:00:36 AM

Last updated: 2/9/2026, 3:01:53 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats