Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4973: Cross Site Scripting in SourceCodester Online Quiz System

0
Medium
VulnerabilityCVE-2026-4973cvecve-2026-4973
Published: Fri Mar 27 2026 (03/27/2026, 19:52:46 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Online Quiz System

Description

A vulnerability was detected in SourceCodester Online Quiz System up to 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-question.php. Performing a manipulation of the argument quiz_question results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 20:31:40 UTC

Technical Analysis

CVE-2026-4973 identifies a cross-site scripting vulnerability in SourceCodester Online Quiz System version 1.0, specifically in the add-question.php file's quiz_question parameter. This parameter does not properly sanitize user input, allowing attackers to inject malicious JavaScript code. The vulnerability is remotely exploitable without authentication, though it requires user interaction to execute the malicious script. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to trigger the payload. The vulnerability impacts confidentiality and integrity by enabling attackers to steal session cookies, perform actions on behalf of users, or manipulate quiz content. The CVSS 4.0 vector indicates no impact on availability or system control but highlights the risk of user data compromise. Although no active exploits have been observed in the wild, a public exploit exists, increasing the risk of exploitation. The lack of vendor patches or official remediation guidance necessitates immediate defensive measures. This vulnerability is particularly relevant for educational institutions and organizations using SourceCodester's Online Quiz System for assessments or training.

Potential Impact

The primary impact of CVE-2026-4973 is the compromise of user confidentiality and integrity within the affected Online Quiz System. Attackers can execute arbitrary scripts in the context of the victim's browser, potentially stealing session tokens, credentials, or other sensitive information. This can lead to unauthorized access to user accounts or manipulation of quiz data, undermining the trustworthiness of assessments. The vulnerability does not affect system availability directly but can cause reputational damage and loss of user confidence. Since the exploit is remotely executable and requires no authentication, any exposed instance of the vulnerable software is at risk. Organizations relying on this system for educational or certification purposes may face data breaches or fraudulent activity. The medium severity score reflects moderate risk but should not be underestimated given the public availability of exploits.

Mitigation Recommendations

To mitigate CVE-2026-4973, organizations should implement strict input validation and output encoding on the quiz_question parameter to neutralize malicious scripts. Employing a web application firewall (WAF) with rules targeting XSS payloads can provide an additional layer of defense. Since no official patch is currently available, consider isolating the affected application from public networks or restricting access to trusted users only. Educate users about the risks of clicking suspicious links or submitting untrusted content. Regularly monitor logs for unusual activity related to add-question.php requests. If possible, update or replace the vulnerable software with a version that addresses this issue. Conduct security testing, including automated scanning and manual code review, to identify and remediate similar vulnerabilities in custom or third-party components. Finally, implement Content Security Policy (CSP) headers to limit the impact of potential XSS attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-27T08:55:48.525Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c6e53a3c064ed76fede078

Added to database: 3/27/2026, 8:14:50 PM

Last enriched: 3/27/2026, 8:31:40 PM

Last updated: 3/27/2026, 11:41:53 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses