CVE-2026-5106: Cross Site Scripting in code-projects Exam Form Submission
A flaw has been found in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_fst.php. Executing a manipulation of the argument sname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
AI Analysis
Technical Summary
CVE-2026-5106 is a cross-site scripting (XSS) vulnerability identified in the code-projects Exam Form Submission software, version 1.0. The vulnerability resides in the /admin/update_fst.php script, where the 'sname' parameter is improperly sanitized or validated, allowing an attacker to inject malicious JavaScript code. This injection occurs when the application processes the 'sname' input without adequate encoding or filtering, enabling the execution of arbitrary scripts in the context of the victim's browser. The attack vector is remote and does not require prior authentication, although user interaction is necessary to trigger the malicious payload, such as clicking a crafted URL or submitting manipulated form data. The vulnerability can lead to session hijacking, defacement, or redirection to malicious sites, compromising confidentiality and integrity of user data. The CVSS 4.8 score reflects a medium severity, considering the ease of exploitation (low complexity), no privileges required, but requiring user interaction. No patches have been officially released yet, and no known exploits are actively observed in the wild, but a proof-of-concept exploit has been published, increasing the risk of future attacks. The vulnerability affects only version 1.0 of the Exam Form Submission product, which is used primarily in educational or administrative environments that rely on this software for exam form processing.
Potential Impact
The impact of CVE-2026-5106 on organizations can be significant, particularly for those relying on the vulnerable Exam Form Submission software for managing exam-related data. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim. This can undermine the integrity of exam data, disrupt administrative processes, and damage organizational reputation. Although the vulnerability does not directly affect system availability or cause data loss, the confidentiality and integrity of user sessions and data are at risk. Educational institutions and administrative bodies using this software may face compliance issues if sensitive student or exam data is exposed. The remote exploitability and published proof-of-concept increase the likelihood of targeted attacks, especially if the software is exposed to the internet without adequate protections. Organizations with limited IT security resources or lacking timely patch management processes are particularly vulnerable.
Mitigation Recommendations
To mitigate CVE-2026-5106, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of an official patch, implement input validation and output encoding on the 'sname' parameter within the /admin/update_fst.php script to neutralize malicious scripts. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this parameter. Restrict access to the /admin/ directory through network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. Educate users about the risks of clicking suspicious links and encourage cautious behavior to reduce the chance of successful user interaction exploitation. Regularly audit and monitor web server logs for unusual requests targeting the vulnerable endpoint. Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. Finally, plan to upgrade to a newer, secure version of the software once available or consider alternative solutions if the vendor does not provide timely remediation.
Affected Countries
United States, India, United Kingdom, Germany, Canada, Australia, France, Brazil, South Africa, Japan
CVE-2026-5106: Cross Site Scripting in code-projects Exam Form Submission
Description
A flaw has been found in code-projects Exam Form Submission 1.0. The impacted element is an unknown function of the file /admin/update_fst.php. Executing a manipulation of the argument sname can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-5106 is a cross-site scripting (XSS) vulnerability identified in the code-projects Exam Form Submission software, version 1.0. The vulnerability resides in the /admin/update_fst.php script, where the 'sname' parameter is improperly sanitized or validated, allowing an attacker to inject malicious JavaScript code. This injection occurs when the application processes the 'sname' input without adequate encoding or filtering, enabling the execution of arbitrary scripts in the context of the victim's browser. The attack vector is remote and does not require prior authentication, although user interaction is necessary to trigger the malicious payload, such as clicking a crafted URL or submitting manipulated form data. The vulnerability can lead to session hijacking, defacement, or redirection to malicious sites, compromising confidentiality and integrity of user data. The CVSS 4.8 score reflects a medium severity, considering the ease of exploitation (low complexity), no privileges required, but requiring user interaction. No patches have been officially released yet, and no known exploits are actively observed in the wild, but a proof-of-concept exploit has been published, increasing the risk of future attacks. The vulnerability affects only version 1.0 of the Exam Form Submission product, which is used primarily in educational or administrative environments that rely on this software for exam form processing.
Potential Impact
The impact of CVE-2026-5106 on organizations can be significant, particularly for those relying on the vulnerable Exam Form Submission software for managing exam-related data. Successful exploitation allows attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the victim. This can undermine the integrity of exam data, disrupt administrative processes, and damage organizational reputation. Although the vulnerability does not directly affect system availability or cause data loss, the confidentiality and integrity of user sessions and data are at risk. Educational institutions and administrative bodies using this software may face compliance issues if sensitive student or exam data is exposed. The remote exploitability and published proof-of-concept increase the likelihood of targeted attacks, especially if the software is exposed to the internet without adequate protections. Organizations with limited IT security resources or lacking timely patch management processes are particularly vulnerable.
Mitigation Recommendations
To mitigate CVE-2026-5106, organizations should first check for any official patches or updates from the vendor and apply them promptly once available. In the absence of an official patch, implement input validation and output encoding on the 'sname' parameter within the /admin/update_fst.php script to neutralize malicious scripts. Employ web application firewalls (WAFs) with rules designed to detect and block XSS payloads targeting this parameter. Restrict access to the /admin/ directory through network segmentation, VPNs, or IP whitelisting to limit exposure to trusted users only. Educate users about the risks of clicking suspicious links and encourage cautious behavior to reduce the chance of successful user interaction exploitation. Regularly audit and monitor web server logs for unusual requests targeting the vulnerable endpoint. Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. Finally, plan to upgrade to a newer, secure version of the software once available or consider alternative solutions if the vendor does not provide timely remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-29T17:52:11.498Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69ca9568e6bfc5ba1d43cfe8
Added to database: 3/30/2026, 3:23:20 PM
Last enriched: 3/30/2026, 3:38:23 PM
Last updated: 3/30/2026, 10:46:18 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.