Description
A security vulnerability has been detected in code-projects Accounting System 1.0. Impacted is an unknown function of the file /my_account/add_costumer.php of the component Web Application Interface. Such manipulation of the argument costumer_name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Published: 2026-03-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting that can be exploited remotely
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a stored XSS flaw introduced through the costumer_name parameter in /my_account/add_costumer.php. When malicious script is entered, it is later rendered to users in the same browser, allowing an attacker to steal session cookies, deface pages, or perform phishing attacks. This weakness is identified as CWE‑79 and involves potential code injection (CWE‑94).

Affected Systems

The affected product is code‑projects Accounting System 1.0, a PHP‑based web. No additional versions are listed, so this version is known to be vulnerable.

Risk and Exploitability

The CVSS score of 5.1 places the flaw in the medium range, and the EPSS score is unavailable, so the exact probability of exploitation is unclear. However, the flaw can be triggered from an unauthenticated HTTP request to the add_costumer.php endpoint by simply submitting a malicious value for costumer_name, and can be abused remotely. The vulnerability is not currently tracked by CISA KEV, but the public disclosure and remote exploitability suggest a reasonable risk of exploitation if left unpatched.

Generated by OpenCVE AI on March 26, 2026 at 03:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Sanitize and HTML‑escape any user input received for costumer_name before rendering it in the page.
  • Add a Content Security Policy header that disallows inline script execution.
  • Log and monitor requests to /my_account/add_costumer.php for suspicious payloads.
  • When a vendor patch or updated release becomes available, apply it immediately.

Generated by OpenCVE AI on March 26, 2026 at 03:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects accounting System
Vendors & Products Code-projects
Code-projects accounting System

Thu, 26 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Accounting System 1.0. Impacted is an unknown function of the file /my_account/add_costumer.php of the component Web Application Interface. Such manipulation of the argument costumer_name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
Title code-projects Accounting System Web Application add_costumer.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Accounting System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T18:22:10.552Z

Reserved: 2026-03-25T14:24:10.977Z

Link: CVE-2026-4835

cve-icon Vulnrichment

Updated: 2026-03-26T18:22:05.958Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T03:16:04.363

Modified: 2026-03-30T13:26:50.827

Link: CVE-2026-4835

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:08:50Z

Weaknesses