CVE-2026-4577
Description
A vulnerability was found in code-projects Exam Form Submission 1.0. The affected element is an unknown function of the file /admin/update_s4.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS vulnerability in code-projects Exam Form Submission 1.0 allows remote attackers to inject arbitrary scripts via the sname parameter in /admin/update_s4.php.
Root
Cause
A reflected cross-site scripting (XSS) vulnerability has been identified in code-projects Exam Form Submission version 1.0. The vulnerability resides in the /admin/update_s4.php file, where the sname parameter is processed. The root cause is that user-supplied input is directly output to the web page without proper encoding or filtering, enabling an attacker to inject malicious script code [1].
Exploitation
The attack can be initiated remotely and does not require authentication or authorization [1]. An attacker can craft a URL containing a payload in the sname parameter, such as ``, and deliver it to a victim. When the victim accesses the crafted URL, the script executes in their browser context.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can lead to theft of cookies, session tokens, or other sensitive information, as well as performing actions on behalf of the victim, defacing web pages, redirecting users to malicious sites, or potentially gaining control of the victim's browser [1].
Mitigation
As of the publication date, the vendor has not released a patch. The recommended remediation is to implement proper output encoding for all user input when rendering on web pages, and to validate and sanitize the sname parameter [1]. Users should consider applying input validation and output encoding as a workaround until an official fix is available.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.