Description
A security vulnerability has been detected in SourceCodester Leave Application System 1.0. Affected by this issue is some unknown functionality of the component User Management Handler. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-31
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (remote)
Action: Assess Impact
AI Analysis

Impact

The vulnerability appears in the user management portion of SourceCodester Leave Application System 1.0, allowing attackers to inject persistent malicious JavaScript that is executed whenever a user views the compromised data. This flaw, classified as input validation weakness and dynamic code execution, can enable session hijacking, credential theft, defacement or other client‑side abuses. The attack vector relies on malicious input being saved and later rendered without proper sanitization.

Affected Systems

SourceCodester Leave Application System version 1.0 is affected. Users running this release or earlier versions are potentially at risk. No newer versions that contain a fix are listed.

Risk and Exploitability

The base vulnerability score is 4.8, indicating moderate risk. No publicly available probability measure has been published. The flaw is not recorded in the CISA Known Exploited Vulnerabilities catalog. An attacker can exploit the flaw remotely by inserting crafted input into an administrative or user field, which is then stored and displayed to other users. Execution requires that a victim views the affected content, after which the injected script runs in that user’s browser, potentially leading to the compromise of session information or other client‑side data.

Generated by OpenCVE AI on March 31, 2026 at 20:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Confirm the version of SourceCodester Leave Application System you are running.
  • If you are on version 1.0 or earlier, monitor vendor communications for a forthcoming patch.
  • Implement server‑side input validation and output encoding (for example, apply htmlspecialchars to all user‑provided data before rendering).
  • Configure security headers such as X‑Content‑Type‑Options, X‑XSS‑Protection, and a strict Content‑Security‑Policy to reduce the likelihood that injected scripts execute.
  • Review application logs for unusual input patterns and audit user‑controlled fields for security compliance.

Generated by OpenCVE AI on March 31, 2026 at 20:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester leave Application System
Vendors & Products Sourcecodester
Sourcecodester leave Application System
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in SourceCodester Leave Application System 1.0. Affected by this issue is some unknown functionality of the component User Management Handler. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title SourceCodester Leave Application System User Management cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Leave Application System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-31T20:30:43.222Z

Reserved: 2026-03-31T10:18:21.484Z

Link: CVE-2026-5209

cve-icon Vulnrichment

Updated: 2026-03-31T20:30:37.798Z

cve-icon NVD

Status : Deferred

Published: 2026-03-31T19:16:29.383

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5209

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:53:14Z

Weaknesses