Description
A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.
Published: 2026-03-27
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

A reflected cross‑site scripting vulnerability was found in the Admission Enquiry module of QDOCS Smart School Management System. The flaw is triggered by manipulating the Note argument sent to the /admin/enquiry endpoint. When the input is not properly sanitized, the resulting script is executed in the browsers of users who view the affected page, potentially allowing session hijacking, credential theft, defacement or other client‑side attacks.

Affected Systems

The issue affects QDOCS Smart School Management System versions up to and including 7.2. Any installation that contains the Admission Enquiry component accessed through /admin/enquiry is potentially vulnerable.

Risk and Exploitability

The CVSS base score of 5.1 indicates moderate severity. No EPSS score is reported and the vulnerability is not listed in the CISA KEV catalog. According to the description, the exploit can be performed remotely by submitting a crafted request to the vulnerable endpoint. The vulnerability is a classic reflected XSS and has no stated authentication requirement, implying that users who can reach the endpoint may be able to trigger it. The attack would rely on user interaction for the payload to execute.

Generated by OpenCVE AI on March 28, 2026 at 06:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch or upgrade to a later than version 7.2 if one is available.
  • Sanitize and escape all user‑supplied input in the Note field before rendering it.
  • Implement role‑based access control or other restrictions to limit exposure of the /admin/enquiry functionality to trusted users.
  • Monitor web traffic for suspicious script injection attempts.

Generated by OpenCVE AI on March 28, 2026 at 06:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.
Title QDOCS Smart School Management System Admission Enquiry enquiry cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:ND/RL:ND/RC:ND'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:X/RC:X'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T22:11:15.626Z

Reserved: 2026-03-27T13:47:44.993Z

Link: CVE-2026-4991

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-27T23:17:19.340

Modified: 2026-03-27T23:17:19.340

Link: CVE-2026-4991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-29T20:29:31Z

Weaknesses