Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26464: n/a

0
Medium
VulnerabilityCVE-2026-26464cvecve-2026-26464
Published: Mon Feb 23 2026 (02/23/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2026-26464 is a stored Cross-Site Scripting (XSS) vulnerability in the Society Management System Portal V1. 0, specifically in the /admin/edit_user. php page. It allows remote attackers to inject malicious JavaScript code via the 'name' parameter in a POST request. The injected script is stored and executed when other users, including administrators, view the affected content. This vulnerability requires user interaction to trigger and does not require authentication. The CVSS score is 6. 1 (medium severity), reflecting limited confidentiality and integrity impact but no availability impact. No known exploits are reported in the wild yet. Organizations using this software should prioritize patching or applying mitigations to prevent potential exploitation that could lead to session hijacking or privilege escalation through script execution in admin contexts.

AI-Powered Analysis

AILast updated: 02/23/2026, 21:04:15 UTC

Technical Analysis

CVE-2026-26464 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Society Management System Portal version 1.0. The vulnerability exists on the /admin/edit_user.php page, where the 'name' parameter in a POST HTTP request is not properly sanitized or encoded, allowing attackers to inject arbitrary JavaScript code. This malicious code is stored persistently on the server and executed in the browsers of users who view the compromised page, including administrators. The attack vector is remote and does not require prior authentication, but user interaction is necessary to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session cookies, perform actions on behalf of users, or manipulate displayed content. The CVSS v3.1 score of 6.1 reflects a medium severity with network attack vector, low attack complexity, no privileges required, and user interaction needed. No patches or known exploits have been reported at the time of publication, but the vulnerability poses a significant risk in administrative contexts where elevated privileges can be abused. The scope is limited to the Society Management System Portal V1.0, and the vulnerability is classified as stored XSS, which is more dangerous than reflected XSS due to persistent code injection.

Potential Impact

The primary impact of CVE-2026-26464 is the compromise of confidentiality and integrity within affected systems. Attackers can execute arbitrary JavaScript in the context of the victim's browser, potentially stealing session tokens, cookies, or other sensitive information. This can lead to unauthorized access, privilege escalation, or manipulation of administrative functions. Since the vulnerability affects the admin interface, successful exploitation could allow attackers to perform administrative actions or pivot further into the network. Although availability is not directly impacted, the trustworthiness of the system is undermined, and attackers could use the vulnerability as a foothold for more severe attacks. Organizations worldwide using the Society Management System Portal V1.0 are at risk, especially those with multiple administrators or users accessing the vulnerable page. The lack of known exploits in the wild suggests limited current active exploitation, but the vulnerability remains a significant threat if left unaddressed.

Mitigation Recommendations

To mitigate CVE-2026-26464, organizations should first check for and apply any available patches or updates from the software vendor. In the absence of official patches, immediate steps include implementing strict input validation and output encoding on the 'name' parameter in /admin/edit_user.php to prevent injection of malicious scripts. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit administrative access to trusted networks and enforce multi-factor authentication to reduce the risk of exploitation. Regularly audit and sanitize stored user inputs to remove any injected scripts. Additionally, monitor logs for suspicious POST requests targeting the 'name' parameter and educate administrators about the risks of XSS attacks. Deploy web application firewalls (WAFs) with rules to detect and block XSS payloads targeting this endpoint. Finally, consider isolating the admin interface behind VPN or IP whitelisting to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-02-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699cbd8cbe58cf853bc4b46f

Added to database: 2/23/2026, 8:50:20 PM

Last enriched: 2/23/2026, 9:04:15 PM

Last updated: 2/24/2026, 4:11:45 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats