Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4909: Cross Site Scripting in code-projects Exam Form Submission

0
Medium
VulnerabilityCVE-2026-4909cvecve-2026-4909
Published: Fri Mar 27 2026 (03/27/2026, 02:25:24 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Exam Form Submission

Description

CVE-2026-4909 is a medium severity cross-site scripting (XSS) vulnerability found in code-projects Exam Form Submission versions 1. 0 and 7. php, specifically in the /admin/update_s7. php file. The vulnerability arises from improper sanitization of the 'sname' parameter, allowing remote attackers to inject malicious scripts. Exploitation requires high privileges and user interaction but no authentication bypass. Although no known exploits are currently active in the wild, a public exploit is available, increasing the risk of targeted attacks. This vulnerability can lead to session hijacking, defacement, or redirection to malicious sites, impacting confidentiality and integrity. Organizations using this software should prioritize patching or implementing input validation and output encoding. Countries with significant use of this product or similar web applications, especially those with strategic educational or administrative targets, are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 02:59:52 UTC

Technical Analysis

CVE-2026-4909 identifies a cross-site scripting (XSS) vulnerability in the code-projects Exam Form Submission software, specifically affecting versions 1.0 and 7.php. The vulnerability is located in the /admin/update_s7.php file, where the 'sname' parameter is improperly sanitized, allowing attackers to inject malicious JavaScript code. This flaw enables remote attackers to execute scripts in the context of the victim’s browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 vector indicates that the attack can be launched remotely (AV:N) with low attack complexity (AC:L), but requires high privileges (PR:H) and user interaction (UI:P). There is no impact on confidentiality (VC:N), integrity (VI:L), or availability (VA:N) directly from the vulnerability, but the injected scripts can indirectly compromise these aspects. The vulnerability does not require authentication bypass or scope changes. Although no active exploits are reported in the wild, a public exploit is available, which could facilitate exploitation by attackers. The lack of official patches or mitigations in the provided data suggests that organizations must implement compensating controls to reduce risk. This vulnerability is typical of web applications that fail to properly validate or encode user input before rendering it in web pages, a common security oversight in many PHP-based applications.

Potential Impact

The primary impact of CVE-2026-4909 is the potential for attackers to execute arbitrary scripts in the context of authenticated users with high privileges, which can lead to session hijacking, theft of sensitive information, or unauthorized actions within the affected application. This can compromise the confidentiality and integrity of user data and potentially allow attackers to escalate privileges or pivot to other parts of the network. Although availability is not directly affected, successful exploitation could lead to defacement or redirection attacks that disrupt normal operations. Organizations using the affected software, particularly in educational or administrative environments, may face reputational damage, data breaches, and compliance violations. The availability of a public exploit increases the likelihood of targeted attacks, especially if the software is exposed to the internet without adequate protections. The medium CVSS score reflects the moderate risk posed by the vulnerability, balancing ease of exploitation with the requirement for high privileges and user interaction.

Mitigation Recommendations

To mitigate CVE-2026-4909, organizations should first seek and apply any official patches or updates from the vendor once available. In the absence of patches, implement strict input validation and output encoding on the 'sname' parameter and any other user-supplied data to prevent script injection. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Limit access to the /admin/update_s7.php endpoint to trusted users and networks, using network segmentation and access controls. Monitor web application logs for suspicious input patterns indicative of XSS attempts. Educate users about the risks of interacting with untrusted content and ensure that high-privilege accounts follow the principle of least privilege. Consider deploying a Web Application Firewall (WAF) configured to detect and block XSS payloads targeting this parameter. Regularly conduct security assessments and code reviews to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-26T16:05:14.223Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5ef1e3c064ed76f1376f0

Added to database: 3/27/2026, 2:44:46 AM

Last enriched: 3/27/2026, 2:59:52 AM

Last updated: 3/27/2026, 4:59:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses