Description
In manikandan580 School-management-system 1.0, a reflected cross-site scripting (XSS) vulnerability exists in /studentms/admin/contact-us.php via the email POST parameter.
Published: 2026-04-14
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A reflected XSS flaw is present in the /studentms/admin/contact‑us.php script of the 1.0 release of manikandan580 School‑management‑system. The vulnerability arises when a value supplied in the email POST parameter is echoed back to the browser without proper encoding. If an attacker supplies malicious JavaScript in this field, the script will run in the context of an admin’s browser session, potentially allowing cookie theft, session hijack, or execution of arbitrary code.

Affected Systems

This vulnerability affects only the 1.0 version of the School‑management‑system by the developer named manikandan580. No other vendors or product variants are listed in the advisory, and no specific CPE strings are provided.

Risk and Exploitability

The CVSS base score is 6.1, and the EPSS score is < 1%, so a precise quantitative risk cannot be calculated. Based on the description, the flaw can be triggered remotely via an HTTP POST to the contact‑us page, and the email field can be supplied by an attacker. The absence of explicit authentication requirements in the advisory means it is unclear whether only authenticated users can reach the page; however, the lack of such detail allows us to infer that if the page is accessible, an attacker could craft a link or form to deliver the payload. The vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 10, 2026 at 21:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade to a newer version of the School‑management‑system that removes the reflected XSS in the contact‑us page.
  • Ensure the email POST parameter is validated and properly encoded before inclusion in any HTML output.
  • Implement a Content Security Policy that disallows inline scripts and restricts script sources to trusted domains.
  • Perform a security review or penetration test focused on input handling in administrative interfaces of the application.

Generated by OpenCVE AI on May 10, 2026 at 21:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 10 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Reflected XSS via Email Parameter in School Management System 1.0

Sun, 10 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Manikandan580
Manikandan580 school-management-system
Vendors & Products Manikandan580
Manikandan580 school-management-system

Wed, 15 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Title Reflected XSS via Email Parameter in School Management System 1.0
Weaknesses CWE-79

Tue, 14 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description In manikandan580 School-management-system 1.0, a reflected cross-site scripting (XSS) vulnerability exists in /studentms/admin/contact-us.php via the email POST parameter.
References

Subscriptions

Manikandan580 School-management-system
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-10T20:01:56.964Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65134

cve-icon Vulnrichment

Updated: 2026-04-14T18:03:35.381Z

cve-icon NVD

Status : Deferred

Published: 2026-04-14T16:16:34.383

Modified: 2026-05-10T21:16:27.240

Link: CVE-2025-65134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-10T22:00:14Z

Weaknesses