Description
A security flaw has been discovered in itsourcecode Payroll Management System up to 1.0. This affects an unknown function of the file /index.php. Performing a manipulation of the argument page results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (remote, user‑level, publicly exploitable)
Action: Patch
AI Analysis

Impact

A cross‑site scripting flaw was identified in the Payroll Management System’s index page, where manipulating the “page” argument allows arbitrary JavaScript injection into the browser. The vulnerability is anchored in a missing or improper output encoding and falls under the CWE‑79 security weakness. An attacker can exploit this flaw remotely by crafting a URL that delivers malicious scripts to a victim’s session. This can lead to credential theft, session hijacking, defacement, or the execution of additional attack payloads within the victim’s browser context.

Affected Systems

The flaw affects itsourcecode’s Payroll Management System up to version 1.0. The vulnerable functionality resides in the /index.php file and is triggered by the page parameter. Users running any release at or below v1.0 risk exposure if the page argument is not properly sanitized.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate impact, primarily affecting confidentiality and integrity at the user level. No EPSS score is provided and the vulnerability is not listed in the KEV catalog; however, the public release of the exploit means that the attack path is well known. The vulnerability can be invoked purely through a crafted HTTP request, with no authentication or privilege escalation required. As such, any exposed instance of the affected system poses a tangible risk to users who interact with the index page.

Generated by OpenCVE AI on March 26, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of itsourcecode Payroll Management System that resolves the XSS vulnerability.
  • If an update is unavailable, restrict or sanitize input on the ‘page’ parameter to allow only safe values and reject script payloads.
  • Deploy or configure a web application firewall to block known XSS attack patterns targeting the index page.

Generated by OpenCVE AI on March 26, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in itsourcecode Payroll Management System up to 1.0. This affects an unknown function of the file /index.php. Performing a manipulation of the argument page results in cross site scripting. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Title itsourcecode Payroll Management System index.php cross site scripting
First Time appeared Itsourcecode
Itsourcecode payroll Management System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:itsourcecode:payroll_management_system:*:*:*:*:*:*:*:*
Vendors & Products Itsourcecode
Itsourcecode payroll Management System
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Payroll Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T18:25:16.231Z

Reserved: 2026-03-26T06:10:55.785Z

Link: CVE-2026-4877

cve-icon Vulnrichment

Updated: 2026-03-26T18:17:49.752Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T14:16:14.490

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-4877

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:28:22Z

Weaknesses