Impact
A flaw in code-projects Exam Form Submission 1.0 allows an attacker to inject arbitrary JavaScript by manipulating the sname argument in /admin/update_fst.php. The vulnerability is a reflected cross‑site scripting (CWE-79) that also involves potential code execution through server‐side template injection (CWE-94). When exploited, the attacker can run scripts in the context of victim users, enabling session hijacking, cookie theft, or defacement of the web interface.
Affected Systems
The affected product is code‑projects Exam Form Submission version 1.0, as identified on the Code‑Projects website and the GitHub repository. The vulnerability resides in the admin module of this software, specifically the update_fst.php file.
Risk and Exploitability
The CVSS score of 4.8 indicates a medium impact, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. Although not currently listed in the CISA KEV catalog, the exploit has been published and can be triggered remotely, meaning that vulnerable installations without protective controls are at risk of client‑side attacks.
OpenCVE Enrichment