Description
A vulnerability was detected in code-projects Exam Form Submission 1.0. This impacts an unknown function of the file /admin/update_s1.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
Published: 2026-03-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability described is a reflected cross‑site scripting flaw found in the /admin/update_s1.php file of code‑projects Exam Form Submission. By manipulating the sname argument, an attacker can inject and execute arbitrary JavaScript in the browsers of users who view the affected page. The flaw is limited to the input handling of sname and does not allow arbitrary code execution on the server or arbitrary data access. The impact is confined to the browsers that request the vulnerable endpoint, potentially leaking information or manipulating the page presented to the victim.

Affected Systems

This flaw affects only the 1.0 release of code‑projects Exam Form Submission. The vulnerability is located in an unknown function within the admin interface at /admin/update_s1.php. No other product versions are listed as affected, and there is no information about available patches or updates from the vendor.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the exploit is publicly available, meaning that malicious actors can trigger the vulnerability over the network by sending a crafted HTTP request containing a malicious sname value. Although an EPSS score is not provided and the vulnerability is not listed in CISA’s KEV catalog, the combination of remote attack capability and public availability suggests that organizations running this application should treat the issue with high priority until a vendor fix or appropriate mitigation is applied.

Generated by OpenCVE AI on March 22, 2026 at 18:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify that the installed version is Exam Form Submission 1.0 and that /admin/update_s1.php is accessible.
  • Check for an updated version or a vendor‑issued patch. If a patch is available, apply it immediately. If no patch exists, document the absence of a remedy.
  • Restrict access to the /admin/update_s1.php endpoint to trusted IP addresses or administrative users using firewall or ACL rules.
  • Implement server‑side input validation and output encoding for the sname parameter to neutralize malicious script content.
  • Optionally deploy a web application firewall that blocks or sanitizes suspicious query parameters before they reach the application.

Generated by OpenCVE AI on March 22, 2026 at 18:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 22 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Exam Form Submission 1.0. This impacts an unknown function of the file /admin/update_s1.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.
Title code-projects Exam Form Submission update_s1.php cross site scripting
First Time appeared Code-projects
Code-projects exam Form Submission
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:exam_form_submission:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects exam Form Submission
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Exam Form Submission
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:39:23.559Z

Reserved: 2026-03-21T20:41:28.877Z

Link: CVE-2026-4557

cve-icon Vulnrichment

Updated: 2026-03-23T16:22:54.383Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-22T18:16:05.763

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4557

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:23Z

Weaknesses