Description
Cross Site Scripting vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the visname parameter of visitors-form.php. An authenticated attacker can inject arbitrary JavaScript that is later executed when the malicious input is viewed in manage-newvisitors.php or visitor-detail.php.
Published: 2026-04-20
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (authenticated users)
Action: Apply Fix
AI Analysis

Impact

A stored cross‑site scripting flaw resides in the visname field of visitors‑form.php in Apartment Visitors Management System V1.1. An authenticated user can submit malicious JavaScript that is later rendered when the entry is viewed in manage‑newvisitors.php or visitor‑detail.php. Because the payload is executed in the context of the victim’s browser, the attacker can deface pages, hijack sessions, and run any client‑side code, thereby compromising confidentiality, integrity, and availability of the application for logged‑in users.

Affected Systems

The affected product is Apartment Visitors Management System V1.1, a PHP/MySQL based web application used for managing apartment visitor logs. The vulnerability is tied specifically to the visname parameter of visitors‑form.php and impacts any instance running this version that allows authenticated users to create visitor entries.

Risk and Exploitability

No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalogue. However, the flaw can be exploited by any authenticated user without requiring additional privileges or special conditions, making it widely exploitable within the environment it is deployed. The CVSS base score of 5.4 indicates a medium severity for this XSS flaw. The attacker does not need network access beyond the normal login channel, and based on the description, it is inferred that the attack vector is local to a logged‑in session.

Generated by OpenCVE AI on April 21, 2026 at 00:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Implement input validation and output encoding for the visname field to neutralize XSS payloads.
  • Apply any vendor‑provided updates or patches that address the XSS issue as soon as they become available.
  • Restrict the ability to submit unsanitized visitor names to a minimal set of privileged users or enforce administrative review before data is stored.

Generated by OpenCVE AI on April 21, 2026 at 00:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title Stored Cross‑Site Scripting in Apartment Visitors Management System via visname Parameter

Mon, 20 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Stored Cross‑Site Scripting in Apartment Visitors Management System via visname Parameter

Mon, 20 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description Cross Site Scripting vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the visname parameter of visitors-form.php. An authenticated attacker can inject arbitrary JavaScript that is later executed when the malicious input is viewed in manage-newvisitors.php or visitor-detail.php.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-20T18:07:53.479Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39112

cve-icon Vulnrichment

Updated: 2026-04-20T18:07:49.715Z

cve-icon NVD

Status : Deferred

Published: 2026-04-20T18:16:27.417

Modified: 2026-04-20T18:51:43.663

Link: CVE-2026-39112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:15:16Z

Weaknesses