Description
A flaw has been found in itsourcecode Event Management System 1.0. The impacted element is an unknown function of the file /admin/navbar.php. Executing a manipulation of the argument page can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
Published: 2026-02-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Update
AI Analysis

Impact

The vulnerability resides in the administration interface of the Event Management System where an untrusted page parameter is reflected by the file /admin/navbar.php without proper sanitization. This flaw allows an attacker to inject arbitrary HTML and JavaScript code that will be executed in the browser context of any user who visits the crafted URL. The effect is typical client‑side XSS, enabling theft of cookies, impersonation, or manipulation of the page user interface. The weakness maps to CWE‑79 (Cross‑Site Scripting) and also involves PHP code injection (CWE‑94) due to the evaluation of user input by the server. The affected element can be accessed remotely by appending a malicious page value to the URL, so the attack is not limited to local users.

Affected Systems

The flaw is present in itsourcecode Event Management System version 1.0. No other versions were identified in the source data. This product is supplied by itsourcecode under the name Event Management System.

Risk and Exploitability

The CVSS v3.1 base score of 5.3 indicates a medium severity for the vulnerability. The EPSS probability is reported as less than 1 %, implying that the attack is not widely used or observed in the wild. Nevertheless an exploit has been published and the flaw can be triggered from any remote location with network connectivity to the web application, making it a realistic threat for organizations that run the vulnerable system without a patch or mitigating controls. The flaw is not currently listed in the CISA KEV catalog, but its remote nature and script execution capability warrant proactive attention.

Generated by OpenCVE AI on April 18, 2026 at 11:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Event Management System to a release that sanitizes the page parameter in /admin/navbar.php.
  • If a patch is not immediately available, enforce strict access controls so that only authenticated administrators can call the /admin/navbar.php endpoint, and block or validate the page argument to allow only expected values.
  • Implement output encoding (e.g., htmlspecialchars) or a web application firewall rule to escape or reject the page parameter before rendering to prevent cross‑site scripting.

Generated by OpenCVE AI on April 18, 2026 at 11:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc event Management System
CPEs cpe:2.3:a:admerc:event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc event Management System

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode event Management System
Vendors & Products Itsourcecode
Itsourcecode event Management System

Mon, 23 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Event Management System 1.0. The impacted element is an unknown function of the file /admin/navbar.php. Executing a manipulation of the argument page can lead to cross site scripting. The attack may be performed from remote. The exploit has been published and may be used.
Title itsourcecode Event Management System navbar.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Event Management System
Itsourcecode Event Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:10:43.439Z

Reserved: 2026-02-23T16:46:03.794Z

Link: CVE-2026-3043

cve-icon Vulnrichment

Updated: 2026-02-25T16:10:34.560Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T00:16:19.157

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3043

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses