Description
Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create unauthorized user accounts and administrative users by crafting malicious forms. Attackers can submit hidden form data to /admin/addusers.php and /admin/editadmins.php endpoints to register new users with arbitrary credentials and escalate privileges to SUPERUSER level.
Published: 2026-03-15
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery (CWE-352) vulnerability that allows an unauthenticated attacker to submit malicious form data to the /admin/addusers.php and /admin/editadmins.php endpoints. By crafting a request with arbitrary credentials, an attacker can create new user accounts, including administrative accounts with SUPERUSER level privileges, thereby gaining full control over the application. The primary impact is unauthorized privilege escalation and potential compromise of confidentiality, integrity, and availability of the system.

Affected Systems

The vulnerability affects the Next Click Ventures RealtyScript product, specifically version 4.0.2. No other versions are mentioned in the available data. The attack does not rely on a particular sub-version or patch level beyond 4.0.2, so systems running this exact release are considered vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, through a malicious web form or script that submits data directly to the vulnerable endpoints, without the need for pre-existing credentials. Exploitation requires only basic network connectivity and a crafted request, making it relatively simple in principle but still limited by the low exploit probability indicated by EPSS.

Generated by OpenCVE AI on March 19, 2026 at 16:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact Next Click Ventures to obtain and apply a patch or upgrade to a fixed version of RealtyScript.
  • If a patch is not immediately available, disable or restrict access to the /admin/addusers.php and /admin/editadmins.php endpoints.
  • Implement CSRF protection on all administrative forms to prevent unauthorized form submissions.
  • Review and tighten user privilege assignments, removing unnecessary superuser creation capabilities.
  • Monitor application logs for unexpected user account creation events.

Generated by OpenCVE AI on March 19, 2026 at 16:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Nextclickventures
Nextclickventures realtyscript
CPEs cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*
Vendors & Products Nextclickventures
Nextclickventures realtyscript

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Next Click Ventures
Next Click Ventures realtyscript
Vendors & Products Next Click Ventures
Next Click Ventures realtyscript

Sun, 15 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Next Click Ventures RealtyScript 4.0.2 contains a cross-site request forgery vulnerability that allows unauthenticated attackers to create unauthorized user accounts and administrative users by crafting malicious forms. Attackers can submit hidden form data to /admin/addusers.php and /admin/editadmins.php endpoints to register new users with arbitrary credentials and escalate privileges to SUPERUSER level.
Title RealtyScript 4.0.2 Cross-Site Request Forgery Unauthorized User Creation
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Next Click Ventures Realtyscript
Nextclickventures Realtyscript
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:30:31.130Z

Reserved: 2026-03-15T18:06:12.182Z

Link: CVE-2015-20117

cve-icon Vulnrichment

Updated: 2026-03-16T14:21:14.325Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:47.260

Modified: 2026-03-19T14:13:34.260

Link: CVE-2015-20117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:29Z

Weaknesses