Description
A vulnerability was determined in itsourcecode University Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_result.php. Executing a manipulation of the argument vr can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Assess Impact
AI Analysis

Impact

A vulnerability exists in the University Management System 1.0. An unknown functionality in /view_result.php accepts a vr parameter that can be manipulated to inject arbitrary client‑side script, resulting in a reflected cross‑site scripting flaw (CWE-79, CWE-94). The flaw allows an attacker to run malicious JavaScript in the victim’s browser, potentially stealing session data, performing phishing, or defacing the page. The vulnerability is exploitable remotely by sending a crafted URL to a user.

Affected Systems

The only affected product listed is itsourcecode:University Management System 1.0. No other versions or sub‑versions are specified, indicating the issue is limited to this release.

Risk and Exploitability

The CVSS score is 5.3, indicating moderate severity, and the EPSS score is less than 1%, suggesting low exploitation probability. It is not present in the CISA KEV catalog. The attack vector is a malicious URL that manipulates the vr parameter, which a victim can trigger by clicking a link in email or other media. While publicly disclosed, effective exploitation requires user interaction and may be mitigated by standard input validation.

Generated by OpenCVE AI on March 18, 2026 at 15:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑provided patch or upgrade to a newer version of the University Management System that resolves the XSS flaw.
  • If a patch is not available, modify /view_result.php to properly encode or sanitize the vr parameter before outputting it to the browser.
  • Deploy a Web Application Firewall or an XSS filtering rule to block malicious payloads targeting the view_result.php endpoint.
  • Monitor application logs for suspicious activity or repeated attempts to inject scripts via the vr argument.

Generated by OpenCVE AI on March 18, 2026 at 15:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode university Management System
Vendors & Products Itsourcecode
Itsourcecode university Management System

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode University Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /view_result.php. Executing a manipulation of the argument vr can lead to cross site scripting. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode University Management System view_result.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode University Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:03:19.519Z

Reserved: 2026-03-11T14:30:00.658Z

Link: CVE-2026-3982

cve-icon Vulnrichment

Updated: 2026-03-12T15:03:12.195Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T05:16:14.733

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-3982

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:03Z

Weaknesses