Description
Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

Next Click Ventures RealtyScript version 4.0.2 is affected by a stored cross‑site scripting flaw in the location_name field of the admin locations interface. The vulnerability allows an attacker to submit a POST request to the locations.php endpoint that stores a malicious JavaScript payload in the database and is later rendered in the browsers of administrators who view the affected location records. This is a classic stored XSS identified by CWE‑79 and permits execution of arbitrary code in the context of the administrative account, potentially leading to session hijacking, defacement, or credential theft. Key detail from the vendor disclosure: the issue exists due to improper validation of the location_name input.

Affected Systems

Affected vendor and product: Next Click Ventures RealtyScript, specifically version 4.0.2 as listed in the provided CPE string cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*. The flaw resides in the admin locations interface accessed via the locations.php endpoint.

Risk and Exploitability

The CVSS score of 5.1 classifies this flaw as moderate severity. The EPSS score below 1% indicates a low probability of exploitation in the field, and the vulnerability is not cataloged in the CISA KEV list. The likely attack vector is an attacker in possession of administrative credentials who submits a crafted POST request to the protected endpoint; once a legitimate administrator views the stored record, the embedded script executes. Due to the need for authentication and the narrow exposure surface, the overall risk to a well‑protected environment remains moderate, but early remediation is recommended.

Generated by OpenCVE AI on March 19, 2026 at 16:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that a patch or update has been released by Next Click Ventures that removes the stored XSS flaw in RealtyScript 4.0.2.
  • If an official patch is unavailable, apply input validation or output encoding to the location_name field so that JavaScript code is not stored or rendered.
  • Restrict access to the admin locations interface to trusted IP addresses or enforce VPN‑only connectivity to reduce the attack surface.
  • Deploy a Web Application Firewall rule that blocks requests containing <script> tags or other suspicious payloads sent to the locations.php endpoint.

Generated by OpenCVE AI on March 19, 2026 at 16:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Nextclickventures
Nextclickventures realtyscript
CPEs cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*
Vendors & Products Nextclickventures
Nextclickventures realtyscript

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Next Click Ventures
Next Click Ventures realtyscript
Vendors & Products Next Click Ventures
Next Click Ventures realtyscript

Sun, 15 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers.
Title RealtyScript 4.0.2 Stored Cross-Site Scripting via location_name Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Next Click Ventures Realtyscript
Nextclickventures Realtyscript
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:30:30.949Z

Reserved: 2026-03-15T18:06:31.579Z

Link: CVE-2015-20118

cve-icon Vulnrichment

Updated: 2026-03-16T14:21:12.075Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:47.450

Modified: 2026-03-19T14:15:11.170

Link: CVE-2015-20118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:28Z

Weaknesses