Impact
An unsanitized processing of the fname argument in the /admin/user.php page has been exposed, allowing attackers to inject arbitrary scripts into the browser context when the page is accessed. The vulnerability can be triggered remotely and has publicly disclosed exploitation code. This leads to cross‑site scripting, potentially enabling data theft or session hijacking for any user viewing the affected page.
Affected Systems
The identified affected product is code‑projects Simple IT Discussion Forum version 1.0. The vulnerability resides in the /admin/user.php endpoint and impacts that single release level of the forum application.
Risk and Exploitability
With a CVSS score of 4.8 the risk is moderate. No EPSS data and the vulnerability is not listed in the CISA KEV catalog, indicating it is not currently known to be actively exploited, but the remote attack vector allows any attacker to craft a request and trigger XSS. Absence of a published patch means the risk could persist until a vendor update or mitigation is applied.
OpenCVE Enrichment