Description
A vulnerability was determined in SourceCodester Simple Customer Relationship Management System 1.0. This issue affects some unknown processing of the file /create-ticket.php of the component Create Ticket. This manipulation of the argument Description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-02
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting
Action: Assess Impact
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the Simple Customer Relationship Management System. The flaw arises when an attacker supplies a malicious payload in the Description field on the create‑ticket.php page. Because the application stores the input without proper filtering, the payload is rendered in future ticket views, allowing the attacker to execute arbitrary scripts in the browsers of users who view the ticket. This can lead to session hijacking, defacement, or other client‑side attacks.

Affected Systems

The vulnerability is present in SourceCodester Simple Customer Relationship Management System version 1.0, affecting the Create Ticket component. No other versions or products are listed in the advisory.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. EPSS is not available, and the issue is not listed in CISA’s KEV. Exploitation is remote; an attacker merely needs to trigger the vulnerable input via the web interface. No special privileges are required. Because the flaw is stored, any user who views the affected ticket can be compromised.

Generated by OpenCVE AI on April 2, 2026 at 09:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for a vendor‑released patch for SourceCodester Simple Customer Relationship Management System 1.0.
  • Sanitize or encode user input in the Description field before storing it to eliminate stored XSS.
  • Deploy a web application firewall or similar controls to filter or block malicious XSS payloads.
  • Monitor ticket creation submissions for suspicious or malformed content and investigate any anomalies.

Generated by OpenCVE AI on April 2, 2026 at 09:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester simple Customer Relationship Management System
Vendors & Products Sourcecodester
Sourcecodester simple Customer Relationship Management System

Thu, 02 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in SourceCodester Simple Customer Relationship Management System 1.0. This issue affects some unknown processing of the file /create-ticket.php of the component Create Ticket. This manipulation of the argument Description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Title SourceCodester Simple Customer Relationship Management System Create Ticket create-ticket.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Simple Customer Relationship Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T13:35:08.601Z

Reserved: 2026-04-01T13:15:18.142Z

Link: CVE-2026-5325

cve-icon Vulnrichment

Updated: 2026-04-02T13:35:03.471Z

cve-icon NVD

Status : Received

Published: 2026-04-02T07:15:59.070

Modified: 2026-04-02T07:15:59.070

Link: CVE-2026-5325

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:16Z

Weaknesses