CVE-2026-6486: Cross Site Scripting in classroombookings
A vulnerability was detected in classroombookings up to 2.17.0. This impacts the function read of the file crbs-core/application/views/layout.php of the component User Display Name Handler. The manipulation of the argument displayname results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 2.17.1 will fix this issue. The patch is identified as 69c3c9bb8a17f1ea572d8f4502bf238f0214c98a. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
AI Analysis
Technical Summary
This vulnerability in classroombookings (up to version 2.17.0) allows remote attackers to execute cross-site scripting attacks via the displayname parameter in the User Display Name Handler component located in crbs-core/application/views/layout.php. The issue arises from improper sanitization of the displayname argument, enabling injection of malicious scripts. A patch identified by commit 69c3c9bb8a17f1ea572d8f4502bf238f0214c98a is available in version 2.17.1, which addresses this vulnerability.
Potential Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary scripts in the context of the affected web application, potentially leading to session hijacking, defacement, or other malicious actions that rely on executing code in the victim's browser. The CVSS 4.0 base score is 5.1 (medium), reflecting the network attack vector, low complexity, and partial impact on integrity and availability with user interaction required.
Mitigation Recommendations
Upgrade classroombookings to version 2.17.1 or later, which contains the official fix for this vulnerability. Since the vendor has released this fixed version promptly, applying this update is the recommended and effective mitigation.
CVE-2026-6486: Cross Site Scripting in classroombookings
Description
A vulnerability was detected in classroombookings up to 2.17.0. This impacts the function read of the file crbs-core/application/views/layout.php of the component User Display Name Handler. The manipulation of the argument displayname results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. Upgrading to version 2.17.1 will fix this issue. The patch is identified as 69c3c9bb8a17f1ea572d8f4502bf238f0214c98a. It is suggested to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in classroombookings (up to version 2.17.0) allows remote attackers to execute cross-site scripting attacks via the displayname parameter in the User Display Name Handler component located in crbs-core/application/views/layout.php. The issue arises from improper sanitization of the displayname argument, enabling injection of malicious scripts. A patch identified by commit 69c3c9bb8a17f1ea572d8f4502bf238f0214c98a is available in version 2.17.1, which addresses this vulnerability.
Potential Impact
Successful exploitation of this vulnerability allows an attacker to execute arbitrary scripts in the context of the affected web application, potentially leading to session hijacking, defacement, or other malicious actions that rely on executing code in the victim's browser. The CVSS 4.0 base score is 5.1 (medium), reflecting the network attack vector, low complexity, and partial impact on integrity and availability with user interaction required.
Mitigation Recommendations
Upgrade classroombookings to version 2.17.1 or later, which contains the official fix for this vulnerability. Since the vendor has released this fixed version promptly, applying this update is the recommended and effective mitigation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-04-17T06:58:13.000Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69e22bbf82d89c981ff3d630
Added to database: 4/17/2026, 12:46:55 PM
Last enriched: 4/17/2026, 1:02:04 PM
Last updated: 4/17/2026, 3:06:13 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.