Description
A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clickedu. This vulnerability allows an attacker to execute JavaScript code in the victim’s browser by sending them a malicious URL using the endpoint “/user.php/”. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on the user’s behalf.
Published: 2026-03-27
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: Execute malicious JavaScript in the victim’s browser to steal cookies or perform actions on the user’s behalf
Action: Patch immediately
AI Analysis

Impact

A reflected Cross‑Site Scripting (XSS) flaw exists in Clickedu’s "/user.php/" endpoint. An attacker can embed malicious JavaScript in a URL that, when visited by a user, runs in the victim’s browser. This can steal session cookies and enable the attacker to perform unauthorized actions on the user’s behalf.

Affected Systems

The flaw affects Sanoma Clickedu before version 5.1. The vendor released a fix in Clickedu 5.1.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog, suggesting it may not have widespread exploitation yet. Attackers can use the flaw by crafting a malicious URL and luring users to it, which can be carried out remotely without authentication.

Generated by OpenCVE AI on March 27, 2026 at 15:50 UTC.

Remediation

Vendor Solution

The vulnerability has been fixed by the Sanoma team in version 5.1.


OpenCVE Recommended Actions

  • Update Clickedu to version 5.1 or later
  • If an update is not yet available, block or restrict access to the "/user.php/" endpoint
  • Ensure all user input is properly encoded or sanitized
  • Warn users about phishing attempts containing malicious URLs

Generated by OpenCVE AI on March 27, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
Description A reflected Cross-Site Scripting (XSS) vulnerability has been discovered in Clickedu. This vulnerability allows an attacker to execute JavaScript code in the victim’s browser by sending them a malicious URL using the endpoint “/user.php/”. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on the user’s behalf.
Title Reflected Cross-Site Scripting (XSS) in Sanoma’s Clickedu
First Time appeared Sanoma
Sanoma clickedu
Weaknesses CWE-79
CPEs cpe:2.3:a:sanoma:clickedu:*:*:*:*:*:*:*:*
cpe:2.3:a:sanoma:clickedu:5.1:*:*:*:*:*:*:*
Vendors & Products Sanoma
Sanoma clickedu
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-03-27T15:08:30.583Z

Reserved: 2026-03-27T14:00:08.759Z

Link: CVE-2026-5010

cve-icon Vulnrichment

Updated: 2026-03-27T15:05:36.207Z

cve-icon NVD

Status : Received

Published: 2026-03-27T15:17:04.113

Modified: 2026-03-27T15:17:04.113

Link: CVE-2026-5010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:28:26Z

Weaknesses