Impact
An input parameter named sname in the /admin/update_fst.php script of code‑projects Exam Form Submission can be manipulated to inject arbitrary script code that is then echoed back to the user’s browser. This flaw allows a remote attacker to execute malicious scripts in the context of a victim’s session. The vulnerability is categorized as XSS (CWE‑79) and also relates to code injection (CWE‑94).
Affected Systems
The flaw exists in code‑projects Exam Form Submission 1.0. Any deployment using this version is considered vulnerable, as no further sub‑version information is provided.
Risk and Exploitability
The CVSS v3.1 score of 4.8 places the issue in the moderate range. No EPSS score is available and the vulnerability is not listed in CISA’s KEV catalog. The flaw can be triggered remotely by sending an HTTP request containing a crafted sname value, and an exploit has already been published. Therefore the likelihood of exploitation for exposed installations is potentially high, although the severity is moderate.
OpenCVE Enrichment