Description
A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-03-23
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability occurs in the file /lawyers.php of version 1.0 of the projectworlds Lawyer Management System. By manipulating the first_Name query parameter, an attacker can inject arbitrary HTML or JavaScript code that is reflected back to the user’s browser. This leads to cross‑site scripting, which can be used to steal cookies, hijack sessions, or deface the site. The issue is tracked as a CWE‑79 vulnerability; an additional CWE‑94 flag is present but the description points mainly to unsanitized input leading to reflected XSS.

Affected Systems

Affected systems are installations of projectworlds Lawyer Management System, specifically version 1.0. No other versions are explicitly listed, so users of earlier or later releases are not known to be impacted. The vulnerability is triggered through the first_Name argument in the lawyers.php script, which is publicly reachable via a web request.

Risk and Exploitability

The CVSS score is 5.1, indicating a medium severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, as indicated by the publicly available exploit; an attacker only needs to craft a request to the vulnerable endpoint and can trigger the injection without authentication. Because the input is not sanitized, exploitation can occur easily in any environment that hosts the vulnerable application.

Generated by OpenCVE AI on March 23, 2026 at 20:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply the vendor’s official patch for projectworlds Lawyer Management System 1.0 if it exists.
  • If no patch is available, update the input handling for the first_Name parameter by performing strict validation and sanitization, ensuring that only allowed characters are accepted.
  • Encode or escape all user‑supplied data before rendering it in the browser to prevent script execution.
  • Implement a Content Security Policy (CSP) header to restrict the loading and execution of JavaScript on the site.
  • Regularly scan the web application for XSS and perform penetration testing to verify that the vulnerability has been resolved.

Generated by OpenCVE AI on March 23, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds online Lawyer Management System
CPEs cpe:2.3:a:projectworlds:online_lawyer_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Projectworlds online Lawyer Management System

Tue, 24 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds lawyer Management System
Vendors & Products Projectworlds
Projectworlds lawyer Management System

Mon, 23 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title projectworlds Lawyer Management System lawyers.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Lawyer Management System Online Lawyer Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T18:45:11.073Z

Reserved: 2026-03-22T12:05:35.175Z

Link: CVE-2026-4596

cve-icon Vulnrichment

Updated: 2026-03-24T18:45:07.813Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T20:16:27.837

Modified: 2026-04-10T20:35:02.567

Link: CVE-2026-4596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:36:50Z

Weaknesses