Impact
An unsanitized input parameter 'vr' in the add_result.php script of itsourcecode University Management System 1.0 allows a remote attacker to inject arbitrary scripts into the page. The vulnerability can be exploited via a crafted HTTP request to the /add_result.php endpoint, leading to client-side code execution. This may enable session hijacking, data theft, or defacement of the user interface.
Affected Systems
The vulnerability is present only in itsourcecode University Management System 1.0, specifically in the add_result.php file, where the 'vr' argument is not properly validated or escaped.
Risk and Exploitability
The CVSS score is 4.8, indicating moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. The exploit is remote and publicly available, so the risk is moderate to high for unsaved deployments.
OpenCVE Enrichment