Description
A vulnerability has been found in code-projects Simple ChatBox up to 1.0. Affected by this vulnerability is an unknown functionality of the file /chatbox/insert.php of the component Endpoint. Such manipulation of the argument msg leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Published: 2026-04-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

code‑projects Simple ChatBox contains a stored cross‑site scripting vulnerability in the "insert.php" endpoint. An attacker can send a malicious payload through the "msg" parameter, which the application stores and later displays without proper sanitization. This flaw realises a classic XSS weakness (CWE‑79) and also exhibits code injection potential (CWE‑94). The impact is the execution of arbitrary JavaScript in the context of end users who view the chat messages, enabling session hijacking, credential theft, or content defacement.

Affected Systems

The vulnerable component is the /chatbox/insert.php endpoint of code‑projects Simple ChatBox version 1.0 or earlier. Any installation that has not upgraded past this version is susceptible, regardless of where on the web server the code is deployed.

Risk and Exploitability

The CVSS score of 5.3 classifies the flaw as medium severity; no EPSS score is provided and it is not listed in the CISA KEV catalog. Exploitation requires only a crafted HTTP request containing a malicious "msg" value, which is then reflected back to all users who view the chat. Because the payload is stored, every user that visits the chat interface is potentially exposed, posing a significant risk to confidentiality and integrity. No local privileges are needed, making the vulnerability exploitable from a remote perspective.

Generated by OpenCVE AI on April 13, 2026 at 06:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a newer release that sanitizes the msg input.
  • If no patch is available, enforce strict input validation by whitelisting safe characters or restricting the length of the msg field and escape all output when rendering.
  • Add a Content Security Policy header that blocks inline scripts and limits script sources to trusted domains.
  • Deploy a web application firewall to detect and block malicious payloads targeting the msg parameter.
  • Monitor web server logs for unusual activity related to the /chatbox/insert.php endpoint to identify potential exploitation attempts.

Generated by OpenCVE AI on April 13, 2026 at 06:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Chatbox
Vendors & Products Code-projects
Code-projects simple Chatbox

Mon, 13 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Simple ChatBox up to 1.0. Affected by this vulnerability is an unknown functionality of the file /chatbox/insert.php of the component Endpoint. Such manipulation of the argument msg leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.
Title code-projects Simple ChatBox Endpoint insert.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Chatbox
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T13:17:52.323Z

Reserved: 2026-04-12T18:10:57.235Z

Link: CVE-2026-6159

cve-icon Vulnrichment

Updated: 2026-04-13T13:17:49.446Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-13T05:16:05.207

Modified: 2026-04-13T15:01:43.663

Link: CVE-2026-6159

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:53:11Z

Weaknesses