Description
A vulnerability was identified in itsourcecode Society Management System 1.0. This affects an unknown function of the file /admin/expenses.php. The manipulation of the argument detail leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-01-19
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross Site Scripting via detail parameter in /admin/expenses.php
Action: Apply Patch
AI Analysis

Impact

A flaw in the Society Management System 1.0 allows an attacker to manipulate the ‘detail’ argument sent to the /admin/expenses.php endpoint, leading to reflected cross‑site scripting. The vulnerability enables execution of arbitrary scripts in the victim’s browser, which can be used to hijack sessions, deface content, or perform further client‑side attacks. The description also references CWE‑94, implying a potential for code injection if the input is not properly sanitized. The impact is mainly on confidentiality and integrity of session data, and availability through possible denial‑of‑service via client‑side errors, as can be inferred from the XSS nature of the flaw.

Affected Systems

The vulnerable product is the itsourcecode Society Management System, version 1.0, distributed by itsourcecode. No other versions or sub‑products are referenced, and the known CPE indicates the same product and version. It is therefore required to check only this installation for the flaw.

Risk and Exploitability

The CVSS score of 5.3 places the issue in the medium severity range, while the EPSS score of less than 1 % indicates a very low but non‑zero probability of exploitation. The attack can be launched remotely through standard HTTP requests, and the exploit is publicly available as noted in the advisory. Because the vulnerability is not listed in the CISA KEV catalog, it is not currently known to be actively exploited on a large scale, yet the presence of the public exploit suggests that attackers with moderate resources could target vulnerable installations.

Generated by OpenCVE AI on April 18, 2026 at 05:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Acquire and implement the vendor’s patch for Society Management System 1.0; if none is available, contact the vendor for an official fix.
  • Sanitize and validate the ‘detail’ input on the server side to neutralize script tags and enforce strict encoding before rendering it in the browser.
  • Restrict access to /admin/expenses.php to authenticated administrators only, using role‑based access controls and ensuring session authentication is enforced.
  • Deploy a web application firewall or use mod_security rules that detect and block typical XSS payloads to provide an additional layer of protection.

Generated by OpenCVE AI on April 18, 2026 at 05:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Tue, 20 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Mon, 19 Jan 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode Society Management System 1.0. This affects an unknown function of the file /admin/expenses.php. The manipulation of the argument detail leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title itsourcecode Society Management System expenses.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:40:57.138Z

Reserved: 2026-01-18T07:15:59.863Z

Link: CVE-2026-1134

cve-icon Vulnrichment

Updated: 2026-01-20T20:09:37.165Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T04:15:58.830

Modified: 2026-02-05T20:01:52.750

Link: CVE-2026-1134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses