Impact
The Exam Form Submission 1.0 web application contains a reflected cross‑site scripting flaw in an unnamed function of /admin/update_s4.php. By manipulating the sname query parameter it is possible to inject arbitrary script code that the victim’s browser will execute. The weakness is classified as CWE‑79 and is related to untrusted input handling as indicated by CWE‑94. An attacker who succeeds can run JavaScript in the context of the affected user, potentially compromising credentials, hijacking sessions or defacing the site.
Affected Systems
The only confirmed affected product is code‑projects Exam Form Submission version 1.0. No other vendor or product versions are listed as vulnerable.
Risk and Exploitability
The CVSS base score of 4.8 places this flaw in the medium risk range. EPSS information is not available and the vulnerability is not listed in the CISA KEV catalog, yet the flaw can be triggered remotely and public exploits have been shared. Attackers only need to craft a request that includes malicious content in the sname argument; if the application fails to sanitize it, the script will run in the victim’s browser.
OpenCVE Enrichment