VYPR
Medium severity4.3NVD Advisory· Published Mar 22, 2026· Updated Apr 29, 2026

CVE-2026-4557

CVE-2026-4557

Description

A vulnerability was detected in code-projects Exam Form Submission 1.0. This impacts an unknown function of the file /admin/update_s1.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit is now public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in code-projects Exam Form Submission 1.0 allows remote attackers to inject arbitrary scripts via the 'sname' parameter in /admin/update_s1.php.

Vulnerability

Overview

A cross-site scripting (XSS) vulnerability has been identified in code-projects Exam Form Submission version 1.0. The issue resides in the /admin/update_s1.php file, where the sname parameter is processed. The root cause is that user-supplied input is directly output to the web page without proper encoding or filtering, allowing an attacker to inject arbitrary HTML and JavaScript code [1].

Exploitation

The attack can be initiated remotely and does not require authentication or any special privileges. An attacker can craft a malicious payload, such as `, and submit it via the sname` parameter. When an administrator or other user accesses the affected page, the affected page, the injected script executes in their browser [1].

Impact

Successful exploitation enables an attacker to steal cookies, session tokens, or other sensitive information, perform actions on behalf of the victim, deface web pages, redirect users to malicious sites, or even gain control of the victim's browser. This poses a serious threat to user privacy and system security [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. The recommended fix is to properly encode all user input before outputting it to web pages, specifically by encoding the sname parameter. Users should also consider implementing a Content Security Policy (CSPolicy (CSP) to reduce the risk of script injection [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.