CVE-2026-4973: Cross Site Scripting in SourceCodester Online Quiz System
A vulnerability was detected in SourceCodester Online Quiz System up to 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-question.php. Performing a manipulation of the argument quiz_question results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2026-4973 identifies a cross-site scripting vulnerability in SourceCodester Online Quiz System version 1.0, specifically in the add-question.php file's quiz_question parameter. This parameter does not properly sanitize user input, allowing attackers to inject malicious JavaScript code. The vulnerability is remotely exploitable without authentication, though it requires user interaction to execute the malicious script. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session cookies, perform actions on behalf of users, or manipulate quiz content. The CVSS 4.0 vector indicates no impact on availability or system control but highlights the risk of user data compromise. Although no active exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The lack of vendor patches or official remediation guidance necessitates immediate defensive measures. This vulnerability is particularly relevant for educational institutions and organizations using SourceCodester's Online Quiz System for assessments or training.
Potential Impact
The primary impact of CVE-2026-4973 is the compromise of user confidentiality and integrity within the affected Online Quiz System. Attackers can execute arbitrary scripts in the context of the victim's browser, potentially stealing session tokens, credentials, or other sensitive information. This can lead to unauthorized access to user accounts or manipulation of quiz data, undermining the trustworthiness of assessments. The vulnerability does not affect system availability directly but can cause reputational damage and loss of user confidence. Since the exploit is remotely executable and requires no authentication, any exposed instance of the vulnerable software is at risk. Organizations relying on this system for educational or certification purposes may face data breaches or fraudulent activity. The medium severity score reflects moderate risk but should not be underestimated given the public availability of exploits.
Mitigation Recommendations
To mitigate CVE-2026-4973, organizations should implement strict input validation and output encoding on the quiz_question parameter to neutralize malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patch is currently available, consider isolating the affected application from public networks or restricting access to trusted users only. Educate users about the risks of clicking suspicious links or submitting untrusted content. Regularly monitor logs for unusual activity related to add-question.php requests. If possible, update or replace the vulnerable software with a version that addresses this issue. Conduct security testing, including automated scanning and manual code review, to identify and remediate similar vulnerabilities in custom or third-party components. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks.
Affected Countries
United States, India, United Kingdom, Canada, Australia, Germany, France, Brazil, South Africa, Philippines
CVE-2026-4973: Cross Site Scripting in SourceCodester Online Quiz System
Description
A vulnerability was detected in SourceCodester Online Quiz System up to 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-question.php. Performing a manipulation of the argument quiz_question results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4973 identifies a cross-site scripting vulnerability in SourceCodester Online Quiz System version 1.0, specifically in the add-question.php file's quiz_question parameter. This parameter does not properly sanitize user input, allowing attackers to inject malicious JavaScript code. The vulnerability is remotely exploitable without authentication, though it requires user interaction to execute the malicious script. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session cookies, perform actions on behalf of users, or manipulate quiz content. The CVSS 4.0 vector indicates no impact on availability or system control but highlights the risk of user data compromise. Although no active exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The lack of vendor patches or official remediation guidance necessitates immediate defensive measures. This vulnerability is particularly relevant for educational institutions and organizations using SourceCodester's Online Quiz System for assessments or training.
Potential Impact
The primary impact of CVE-2026-4973 is the compromise of user confidentiality and integrity within the affected Online Quiz System. Attackers can execute arbitrary scripts in the context of the victim's browser, potentially stealing session tokens, credentials, or other sensitive information. This can lead to unauthorized access to user accounts or manipulation of quiz data, undermining the trustworthiness of assessments. The vulnerability does not affect system availability directly but can cause reputational damage and loss of user confidence. Since the exploit is remotely executable and requires no authentication, any exposed instance of the vulnerable software is at risk. Organizations relying on this system for educational or certification purposes may face data breaches or fraudulent activity. The medium severity score reflects moderate risk but should not be underestimated given the public availability of exploits.
Mitigation Recommendations
To mitigate CVE-2026-4973, organizations should implement strict input validation and output encoding on the quiz_question parameter to neutralize malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patch is currently available, consider isolating the affected application from public networks or restricting access to trusted users only. Educate users about the risks of clicking suspicious links or submitting untrusted content. Regularly monitor logs for unusual activity related to add-question.php requests. If possible, update or replace the vulnerable software with a version that addresses this issue. Conduct security testing, including automated scanning and manual code review, to identify and remediate similar vulnerabilities in custom or third-party components. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-27T08:55:48.525Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c6e53a3c064ed76fede078
Added to database: 3/27/2026, 8:14:50 PM
Last enriched: 3/27/2026, 8:31:40 PM
Last updated: 3/27/2026, 11:41:53 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.