Description
A weakness has been identified in code-projects Exam Form Submission 1.0/7.php. This impacts an unknown function of the file /admin/update_s7.php. This manipulation of the argument sname causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-27
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-site scripting (XSS)
Action: Patch
AI Analysis

Impact

A cross-site scripting vulnerability exists in the code-projects Exam Form Submission application. The flaw is located in the admin endpoint /admin/update_s7.php and is triggered when an attacker crafts a malicious value for the sname query parameter. The input is not properly validated or sanitized, allowing an attacker to inject arbitrary client-side scripts that run in the context of the victim’s browser. Such a script can steal session cookies, deface pages, or execute further malicious actions on behalf of the user.

Affected Systems

The vulnerability affects the code-projects Exam Form Submission product, specifically the file update_s7.php in the /admin directory of the application. No additional versions or products are listed as impacted; the description refers to the application as an overall product without a precise version list.

Risk and Exploitability

The CVSS base score of 4.8 indicates a moderate severity, reflecting the potential compromise of confidentiality, integrity, and availability of session data. The attack can be carried out remotely by sending a crafted HTTP request that includes a malicious sname value; the vulnerability is publicly available through the referenced discovery reports. The flaw is not listed in the CISA KEV catalog, and no EPSS score is provided. Because the vulnerability requires the victim to load the affected page, successful exploitation depends on user interaction, but the remote nature and lack of input restrictions increase the likelihood that an attacker could deliver the payload. Administrators should treat this as a high-priority patching issue.

Generated by OpenCVE AI on March 27, 2026 at 07:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an available patch or newer version of Exam Form Submission and upgrade if possible.
  • If no patch exists, modify update_s7.php to validate or encode the sname input to eliminate script injection.
  • Restrict access to the /admin/update_s7.php endpoint to trusted administrators only, enforcing authentication and role-based controls.
  • Implement a Content-Security-Policy header or a web application firewall to mitigate any residual XSS risk.
  • Monitor web application logs for suspicious requests to /admin/update_s7.php and investigate immediately.

Generated by OpenCVE AI on March 27, 2026 at 07:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in code-projects Exam Form Submission 1.0/7.php. This impacts an unknown function of the file /admin/update_s7.php. This manipulation of the argument sname causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title code-projects Exam Form Submission update_s7.php cross site scripting
First Time appeared Code-projects
Code-projects exam Form Submission
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:exam_form_submission:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects exam Form Submission
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Exam Form Submission
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T02:25:24.360Z

Reserved: 2026-03-26T16:05:14.223Z

Link: CVE-2026-4909

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T03:16:02.763

Modified: 2026-03-27T03:16:02.763

Link: CVE-2026-4909

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:22:21Z

Weaknesses