Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5240: Cross Site Scripting in code-projects BloodBank Managing System

0
Medium
VulnerabilityCVE-2026-5240cvecve-2026-5240
Published: Tue Mar 31 2026 (03/31/2026, 23:45:13 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: BloodBank Managing System

Description

CVE-2026-5240 is a medium severity cross-site scripting (XSS) vulnerability found in version 1. 0 of the code-projects BloodBank Managing System. The flaw exists in the /admin_state. php file where the 'statename' parameter is improperly sanitized, allowing remote attackers to inject malicious scripts. Exploitation requires no authentication but does require user interaction, such as an administrator clicking a crafted link. While no known exploits are currently active in the wild, public disclosure increases the risk of exploitation. This vulnerability can lead to session hijacking, defacement, or redirection to malicious sites, impacting confidentiality and integrity. Organizations using this system should prioritize patching or applying input validation controls to mitigate risk. Countries with significant healthcare infrastructure using this product are at higher risk. The CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 00:08:22 UTC

Technical Analysis

CVE-2026-5240 is a cross-site scripting vulnerability identified in the BloodBank Managing System version 1.0 developed by code-projects. The vulnerability stems from insufficient input validation of the 'statename' parameter in the /admin_state.php endpoint. An attacker can craft a malicious URL containing executable JavaScript code within this parameter, which, when accessed by an administrative user, executes in their browser context. This XSS flaw is remotely exploitable without requiring authentication, although it necessitates user interaction, such as clicking on a malicious link. The vulnerability can be leveraged to steal session cookies, perform unauthorized actions on behalf of the user, or redirect users to phishing or malware sites. Despite the absence of known active exploits, the public disclosure of the vulnerability increases the risk of exploitation by opportunistic attackers. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and impacts on integrity and confidentiality but not availability. The vulnerability affects only version 1.0 of the BloodBank Managing System, a specialized healthcare software managing blood bank operations, which may contain sensitive patient and donor data. No official patches have been linked yet, so mitigation relies on input sanitization and restricting access to the vulnerable endpoint.

Potential Impact

The exploitation of this XSS vulnerability can compromise the confidentiality and integrity of sensitive healthcare data managed by the BloodBank Managing System. Attackers can hijack administrative sessions, leading to unauthorized access or manipulation of blood bank records, potentially disrupting critical healthcare services. The attack can also facilitate phishing or malware distribution within healthcare organizations, increasing the risk of broader network compromise. Given the specialized nature of the software, organizations relying on it for blood bank management may face operational disruptions and reputational damage. The vulnerability's remote exploitability without authentication broadens the attack surface, especially if administrative users are targeted via social engineering. However, the requirement for user interaction and the lack of known active exploits somewhat limit immediate widespread impact.

Mitigation Recommendations

Organizations should immediately implement strict input validation and output encoding on the 'statename' parameter within /admin_state.php to neutralize malicious scripts. Until an official patch is released, deploying a Web Application Firewall (WAF) with custom rules to detect and block XSS payloads targeting this parameter can reduce risk. Restrict access to the administrative interface by IP whitelisting or VPN-only access to minimize exposure. Educate administrative users about the risks of clicking unknown links and implement multi-factor authentication to reduce session hijacking impact. Regularly monitor logs for suspicious requests containing script tags or unusual parameter values. Coordinate with the vendor for timely patch releases and apply updates promptly once available. Conduct security assessments and penetration testing focused on input validation controls within the application.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-31T14:17:07.427Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cc5e6ee6bfc5ba1d4effb6

Added to database: 3/31/2026, 11:53:18 PM

Last enriched: 4/1/2026, 12:08:22 AM

Last updated: 4/1/2026, 6:10:16 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses