Description
A vulnerability has been found in code-projects Online Examination System 1.0. Affected is an unknown function of the component Add Pages. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-01-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that can compromise user confidentiality and session integrity
Action: Asses Impact
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the Add Pages functionality of the Online Examination System. This vulnerability allows an attacker to supply malicious script content that is persisted and later rendered to arbitrary users. When a victim visits a page containing the stored payload, the script executes in their browser, potentially exposing session cookies, hijacking accounts, or defacing content. The CWE identifiers indicate an input validation problem (CWE‑79) and possible code injection (CWE‑94). The reported CVSS score of 5.1 reflects a moderate risk when the vulnerability is active. The attack can be carried out remotely by exploiting the Add Pages interface, and the public disclosure indicates that at least one example exploit is known.

Affected Systems

The affected product is the Online Examination System developed by code‑projects, version 1.0. This is the only version documented by the CNA, and the vendor’s product cpe string identifies this single release.

Risk and Exploitability

The EPSS score is below 1%, suggesting a low probability of exploitation at the time of this analysis. The vulnerability is not currently listed in the CISA Known Exploited Vulnerabilities catalog. Attack entry requires remote submission of a malicious payload via the Add Pages component; the payload is then stored and executed for all users who view the affected page. Because the flaw is stored, any authenticated or unauthenticated user visiting the modified page would be vulnerable, raising security impact, yet the low EPSS score indicates that active exploitation may be rare. The CVSS score reflects the potential for loss of confidentiality, integrity, and availability if an attacker successfully injects code.

Generated by OpenCVE AI on April 18, 2026 at 02:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the code‑projects repository or vendor site for an updated release that addresses the XSS flaw and upgrade if available
  • Implement strict server‑side input validation or HTML escaping on all user‑supplied content processed by the Add Pages module to remove or neutralize script tags
  • Deploy a Content Security Policy that disallows inline scripts and controls trusted origins to mitigate the impact of any residual XSS incidents
  • If an immediate patch is unavailable, restrict or disable the Add Pages feature for non‑administrative users until the vulnerability is fixed

Generated by OpenCVE AI on April 18, 2026 at 02:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 28 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Examination System
CPEs cpe:2.3:a:fabian:online_examination_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Examination System

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Examination System
Vendors & Products Code-projects
Code-projects online Examination System

Mon, 26 Jan 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Online Examination System 1.0. Affected is an unknown function of the component Add Pages. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Online Examination System Add Pages cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Examination System
Fabian Online Examination System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:57:11.045Z

Reserved: 2026-01-25T17:07:36.767Z

Link: CVE-2026-1421

cve-icon Vulnrichment

Updated: 2026-01-26T14:59:38.582Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-26T06:16:04.327

Modified: 2026-01-28T14:24:24.363

Link: CVE-2026-1421

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T02:45:27Z

Weaknesses