Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4578: Cross Site Scripting in code-projects Exam Form Submission

0
Medium
VulnerabilityCVE-2026-4578cvecve-2026-4578
Published: Mon Mar 23 2026 (03/23/2026, 07:36:25 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

A vulnerability was determined in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_s3.php. Executing a manipulation of the argument sname can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 08:01:10 UTC

Technical Analysis

CVE-2026-4578 identifies a cross-site scripting (XSS) vulnerability in code-projects Exam Form Submission version 1.0, specifically within the /admin/update_s3.php script. The vulnerability arises from improper sanitization or validation of the 'sname' parameter, which an attacker can manipulate to inject malicious scripts. When a victim user interacts with the affected functionality, the injected script executes in their browser context, potentially leading to session hijacking, defacement, or redirection to malicious sites. The attack vector is remote and does not require authentication, but user interaction is necessary to trigger the payload. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:H indicates high privileges required, but this conflicts with description; assuming PR:H means some privilege is needed), user interaction required (UI:P), and limited impact on integrity (VI:L) with no impact on confidentiality or availability. The vulnerability has been publicly disclosed but no patches or known exploits have been reported yet. This suggests the vulnerability is known but not yet widely exploited. The affected product is niche software used for exam form submissions, likely deployed in educational or administrative environments. The lack of patches means organizations must rely on mitigations until official fixes are released.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to execute arbitrary scripts in the context of users interacting with the vulnerable application. This can lead to session hijacking, theft of sensitive information accessible via the browser, or manipulation of the user interface to deceive users. While the vulnerability does not directly compromise system confidentiality or availability, it undermines data integrity and user trust. In environments where the Exam Form Submission software is used, especially in educational institutions or administrative bodies, successful exploitation could disrupt normal operations or lead to unauthorized actions performed on behalf of legitimate users. Given that exploitation requires user interaction and possibly some privilege level, the scope is somewhat limited but still significant in targeted attacks. The absence of patches increases exposure time, and public disclosure raises the risk of future exploitation attempts.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on the 'sname' parameter to prevent injection of malicious scripts. Employing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Administrators should monitor web server logs for suspicious requests targeting /admin/update_s3.php and consider restricting access to this endpoint to trusted users only. If possible, isolate the vulnerable application behind a web application firewall (WAF) configured to detect and block XSS payloads. Regularly update and patch the software once the vendor releases an official fix. Educate users about the risks of interacting with unexpected or suspicious links within the application. Conduct security assessments and penetration testing focused on input handling in the affected application components. Finally, consider migrating to alternative solutions if timely patches are not forthcoming.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-22T08:51:18.505Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c0efaff4197a8e3b1e6aa4

Added to database: 3/23/2026, 7:45:51 AM

Last enriched: 3/23/2026, 8:01:10 AM

Last updated: 3/25/2026, 1:37:01 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses