Description
A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-03-23
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

A flaw in the lawyers.php page of the 1.0 release of the Projectworlds Lawyer Management System allows an attacker to inject the content of the first_Name parameter into the page without proper escaping. The injected data is reflected back in the browser, enabling execution of arbitrary JavaScript. The description implies that the attacker could hijack sessions, steal credentials, or perform other client‑side attacks, but the severity of those consequences is not detailed in the advisory. The type of XSS is not explicitly defined; it is inferred to be reflected based on the description of manipulating an argument that is displayed. The weakness aligns with CWE‑79 and includes a code manipulation aspect (CWE‑94).

Affected Systems

This vulnerability is reported only for Projectworlds Lawyer Management System version 1.0. No other releases or vendors are listed in the CNA data, so the scope appears limited to that release.

Risk and Exploitability

The CVSS score of 5.1 places the issue in the moderate severity range, while the EPSS estimate of below 1 percent suggests that broad exploitation is unlikely at present. The advisory states the exploit is publicly available and can be triggered remotely by sending a crafted request to lawyers.php. The vulnerability is not included in the CISA KEV catalog, indicating that it has not yet been widely targeted, but the remote nature and potential for client‑side compromise mean it should be addressed promptly.

Generated by OpenCVE AI on April 10, 2026 at 22:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check with Projectworlds for a patch or newer release of the Lawyer Management System and apply it immediately.
  • If no patch is available, validate and sanitize the first_Name input; enforce proper output encoding when rendering the value.
  • Configure a web application firewall to detect and block typical XSS payloads targeting lawyers.php.
  • Monitor application logs for suspicious input patterns and failed XSS attempts.
  • Review and update web application security controls to prevent similar injection issues in the future.

Generated by OpenCVE AI on April 10, 2026 at 22:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds online Lawyer Management System
CPEs cpe:2.3:a:projectworlds:online_lawyer_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Projectworlds online Lawyer Management System

Tue, 24 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds lawyer Management System
Vendors & Products Projectworlds
Projectworlds lawyer Management System

Mon, 23 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title projectworlds Lawyer Management System lawyers.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Lawyer Management System Online Lawyer Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T18:45:11.073Z

Reserved: 2026-03-22T12:05:35.175Z

Link: CVE-2026-4596

cve-icon Vulnrichment

Updated: 2026-03-24T18:45:07.813Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T20:16:27.837

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:28:20Z

Weaknesses