Description
A vulnerability was found in SourceCodester API Key Manager App 1.0. Affected by this vulnerability is an unknown functionality of the component Import Key Handler. Performing a manipulation results in cross site scripting. The attack can be initiated remotely.
Published: 2026-01-05
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS) that can be triggered remotely through the Import Key Handler
Action: Assess
AI Analysis

Impact

SourceCodester API Key Manager App 1.0 contains an import key handler that fails to properly sanitize user input. Manipulation of the import key functionality allows an attacker to inject arbitrary script that executes in the context of users viewing the affected page. The primary consequence is that an authenticated or unauthenticated user could be rendered vulnerable to script execution, potentially leading to session hijacking or defacement. The weakness corresponds to improper input validation (CWE‑79) and code injection (CWE‑94).

Affected Systems

The vulnerability exists only in SourceCodester API Key Manager App version 1.0.

Risk and Exploitability

The CVSS v3 base score is 5.1, indicating moderate severity. The EPSS score is less than 1 %, suggesting a low probability of exploitation in the near term, and the issue is not listed in the CISA KEV catalog. The attack vector is remote; an attacker only needs to send a crafted request to the import key endpoint to trigger the cross‑site scripting. No additional conditions are specified, so the flaw may be exploitable against any active user of the application.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check whether SourceCodester has released a security update for API Key Manager App 1.0 and apply it if available.
  • Implement server‑side input validation or output encoding for the import key handler to ensure that any data rendered in a browser context is escaped.
  • Configure appropriate HTTP security headers such as Content‑Security‑Policy and X‑Content‑Type‑Options to reduce the impact of any remaining script injection.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Remyandrade
Remyandrade api Key Manager App
CPEs cpe:2.3:a:remyandrade:api_key_manager_app:1.0:*:*:*:*:*:*:*
Vendors & Products Remyandrade
Remyandrade api Key Manager App

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester api Key Manager App
Vendors & Products Sourcecodester
Sourcecodester api Key Manager App

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 07:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester API Key Manager App 1.0. Affected by this vulnerability is an unknown functionality of the component Import Key Handler. Performing a manipulation results in cross site scripting. The attack can be initiated remotely.
Title SourceCodester API Key Manager App Import Key cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Remyandrade Api Key Manager App
Sourcecodester Api Key Manager App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:13:12.476Z

Reserved: 2026-01-04T06:47:03.735Z

Link: CVE-2026-0580

cve-icon Vulnrichment

Updated: 2026-01-05T21:09:17.751Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T08:15:58.213

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0580

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses