Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4168: Cross Site Scripting in Tecnick TCExam

0
Medium
VulnerabilityCVE-2026-4168cvecve-2026-4168
Published: Sun Mar 15 2026 (03/15/2026, 06:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Tecnick
Product: TCExam

Description

CVE-2026-4168 is a medium severity cross-site scripting (XSS) vulnerability found in Tecnick TCExam version 16. 5. 0, specifically in the /admin/code/tce_edit_group. php file within the Group Handler component. The vulnerability arises from improper sanitization of the 'Name' argument, allowing remote attackers to inject malicious scripts. Exploitation requires high privileges and user interaction, and no authentication bypass is indicated. Although a public exploit exists, the vendor has indicated that the issue could not be reproduced in later versions, suggesting it has been fixed. Organizations using TCExam 16. 5. 0 or earlier should upgrade to the latest version to mitigate risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 00:40:34 UTC

Technical Analysis

CVE-2026-4168 identifies a cross-site scripting vulnerability in Tecnick TCExam version 16.5.0, specifically within the Group Handler component's /admin/code/tce_edit_group.php file. The vulnerability is triggered by manipulation of the 'Name' parameter, which is not properly sanitized before being reflected in the web interface. This flaw allows remote attackers to inject arbitrary JavaScript code, potentially leading to session hijacking, credential theft, or unauthorized actions performed in the context of an authenticated administrator. The attack vector is remote network access with no need for authentication bypass, but it requires the attacker to have high privileges and user interaction to trigger the malicious payload. The vendor has stated that the vulnerability could not be reproduced in later versions, implying that the issue has been addressed in subsequent patches. The CVSS 4.0 vector indicates a medium severity with a score of 4.8, reflecting the limited scope and the requirement for user interaction and elevated privileges. No known exploits in the wild have been confirmed, but a public exploit is available, increasing the risk of targeted attacks. The vulnerability primarily impacts confidentiality and integrity but does not affect system availability or cause denial of service. The lack of a patch link suggests users should upgrade to the latest TCExam release to remediate the issue.

Potential Impact

The vulnerability allows attackers with high privileges to execute arbitrary scripts in the context of the TCExam web application, potentially leading to session hijacking, unauthorized data access, or manipulation of exam groups and configurations. This could compromise the confidentiality and integrity of sensitive examination data and user credentials. While availability is not directly impacted, successful exploitation could undermine trust in the examination system and lead to reputational damage. Organizations relying on TCExam for exam management, especially educational institutions and certification bodies, may face operational disruptions and data breaches. The requirement for high privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments with multiple administrators or where phishing attacks could facilitate exploitation. The presence of a public exploit increases the likelihood of opportunistic attacks against unpatched systems.

Mitigation Recommendations

Organizations should immediately verify their TCExam version and upgrade to the latest release where this vulnerability is fixed. If upgrading is not immediately feasible, administrators should restrict access to the /admin/code/tce_edit_group.php endpoint to trusted IPs and enforce strict authentication and authorization controls. Input validation and output encoding should be reviewed and enhanced to sanitize the 'Name' parameter and other user inputs rigorously. Implement Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks. Regularly audit administrator accounts and monitor logs for suspicious activity indicative of exploitation attempts. Educate administrators about phishing and social engineering risks that could facilitate user interaction required for exploitation. Finally, maintain an incident response plan to quickly address any detected compromise related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T12:47:23.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b64e669b0f87e881babeba

Added to database: 3/15/2026, 6:15:02 AM

Last enriched: 3/23/2026, 12:40:34 AM

Last updated: 4/28/2026, 7:48:47 AM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses