Description
Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via the text parameter in pages.php allows attackers to inject malicious HTML or iframe content that is persisted and then rendered to users’ browsers
Action: Apply Patch
AI Analysis

Impact

The vulnerability in Next Click Ventures RealtyScript 4.0.2 enables an authenticated attacker to submit malicious content through the text parameter in the pages.php admin interface. The stored payload can include iframe tags or other HTML that will be rendered when viewers access the affected page, resulting in the execution of client‑side scripts in those browsers.

Affected Systems

The affected product is Next Click Ventures RealtyScript version 4.0.2. No other versions or products are listed as vulnerable in the provided data.

Risk and Exploitability

The CVSS v3 score of 5.1 indicates medium severity, and the EPSS score of less than 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the admin interface, but once the malicious page is stored, any user who visits that page can be impacted, resulting in a moderate overall risk.

Generated by OpenCVE AI on March 19, 2026 at 16:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check Next Click Ventures website for an update or patch for RealtyScript 4.0.2 or a newer release.
  • If no patch exists, restrict administrative access to trusted users only and monitor for abnormal activity in the pages.php functionality.

Generated by OpenCVE AI on March 19, 2026 at 16:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Nextclickventures
Nextclickventures realtyscript
CPEs cpe:2.3:a:nextclickventures:realtyscript:4.0.2:*:*:*:*:*:*:*
Vendors & Products Nextclickventures
Nextclickventures realtyscript

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Next Click Ventures
Next Click Ventures realtyscript
Vendors & Products Next Click Ventures
Next Click Ventures realtyscript

Sun, 15 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages.
Title RealtyScript 4.0.2 Stored Cross-Site Scripting via text Parameter in pages.php
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Next Click Ventures Realtyscript
Nextclickventures Realtyscript
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:30:30.762Z

Reserved: 2026-03-15T18:06:49.812Z

Link: CVE-2015-20119

cve-icon Vulnrichment

Updated: 2026-03-16T14:21:10.104Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:47.680

Modified: 2026-03-19T14:15:43.070

Link: CVE-2015-20119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:27Z

Weaknesses