VYPR
Low severity2.4NVD Advisory· Published Mar 23, 2026· Updated Apr 29, 2026

CVE-2026-4577

CVE-2026-4577

Description

A vulnerability was found in code-projects Exam Form Submission 1.0. The affected element is an unknown function of the file /admin/update_s4.php. Performing a manipulation of the argument sname results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in code-projects Exam Form Submission 1.0 allows remote attackers to inject arbitrary scripts via the sname parameter in /admin/update_s4.php.

Root

Cause

A reflected cross-site scripting (XSS) vulnerability has been identified in code-projects Exam Form Submission version 1.0. The vulnerability resides in the /admin/update_s4.php file, where the sname parameter is processed. The root cause is that user-supplied input is directly output to the web page without proper encoding or filtering, enabling an attacker to inject malicious script code [1].

Exploitation

The attack can be initiated remotely and does not require authentication or authorization [1]. An attacker can craft a URL containing a payload in the sname parameter, such as ``, and deliver it to a victim. When the victim accesses the crafted URL, the script executes in their browser context.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can lead to theft of cookies, session tokens, or other sensitive information, as well as performing actions on behalf of the victim, defacing web pages, redirecting users to malicious sites, or potentially gaining control of the victim's browser [1].

Mitigation

As of the publication date, the vendor has not released a patch. The recommended remediation is to implement proper output encoding for all user input when rendering on web pages, and to validate and sanitize the sname parameter [1]. Users should consider applying input validation and output encoding as a workaround until an official fix is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.