Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4169: Cross Site Scripting in Tecnick TCExam

0
Medium
VulnerabilityCVE-2026-4169cvecve-2026-4169
Published: Sun Mar 15 2026 (03/15/2026, 06:02:09 UTC)
Source: CVE Database V5
Vendor/Project: Tecnick
Product: TCExam

Description

CVE-2026-4169 is a cross-site scripting (XSS) vulnerability found in Tecnick TCExam versions up to 16. 6. 0, specifically in the F_xml_export_users function within the XML export component. The flaw allows an authenticated administrator to inject malicious scripts by manipulating XML export functionality. Exploitation requires administrator privileges and some user interaction, limiting its impact since administrators inherently have broad control over the platform. The vendor has released version 16. 6. 1 to address this issue. The CVSS 4. 0 base score is 4.

AI-Powered Analysis

AILast updated: 03/15/2026, 06:29:19 UTC

Technical Analysis

CVE-2026-4169 is a cross-site scripting vulnerability identified in the Tecnick TCExam application, affecting versions 16.0 through 16.6.0. The vulnerability resides in the F_xml_export_users function of the admin/code/tce_xml_users.php file, part of the XML export feature. An attacker with administrator privileges can manipulate input to inject malicious JavaScript code, which is then executed in the context of the administrator's browser when consuming the exported XML data. This flaw enables potential session hijacking, credential theft, or other script-based attacks within the admin interface. However, exploitation requires both administrative access to create the malicious payload and interaction by an administrator to trigger the script, significantly limiting the attack surface. The vendor has released a patch in version 16.6.1 (commit 899b5b2fa09edfe16043f07265e44fe2022b7f12) to remediate this issue. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X) indicates network attack vector, low attack complexity, high privileges required, user interaction needed, and limited impact on integrity. No public exploits are known, and the vendor has expressed skepticism about the practical security impact, given the administrative privileges required to exploit the vulnerability.

Potential Impact

The primary impact of this vulnerability is the potential for an authenticated administrator to execute arbitrary JavaScript code within the TCExam administrative interface. This could lead to session hijacking, unauthorized actions on behalf of the administrator, or disclosure of sensitive information accessible to the administrator. However, since exploitation requires administrative privileges and user interaction, the risk of external attackers leveraging this flaw is low. The vulnerability does not affect confidentiality, integrity, or availability of the system from an unauthenticated or lower-privileged user perspective. Organizations relying on TCExam for exam management could face risks if an insider threat or compromised administrator account exists. The vulnerability could facilitate lateral movement or privilege escalation within an already compromised environment but is unlikely to be a vector for initial compromise.

Mitigation Recommendations

1. Upgrade TCExam to version 16.6.1 or later, which contains the patch addressing this vulnerability. 2. Restrict administrative access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised admin accounts. 3. Monitor administrative activities and audit logs for unusual behavior that might indicate exploitation attempts. 4. Implement Content Security Policy (CSP) headers in the web application to limit the impact of potential XSS attacks by restricting script execution sources. 5. Educate administrators about the risks of executing untrusted scripts or interacting with suspicious exported XML data. 6. Regularly review and sanitize all inputs in custom extensions or integrations with TCExam to prevent similar injection flaws. 7. Employ network segmentation and least privilege principles to limit the scope of damage if an administrator account is compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-14T12:47:26.433Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b64e669b0f87e881babec1

Added to database: 3/15/2026, 6:15:02 AM

Last enriched: 3/15/2026, 6:29:19 AM

Last updated: 3/15/2026, 8:36:07 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses