VYPR
Low severity3.5NVD Advisory· Published Mar 26, 2026· Updated Apr 29, 2026

CVE-2026-4835

CVE-2026-4835

Description

A security vulnerability has been detected in code-projects Accounting System 1.0. Impacted is an unknown function of the file /my_account/add_costumer.php of the component Web Application Interface. Such manipulation of the argument costumer_name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability exists in code-projects Accounting System 1.0 via the costumer_name parameter in /my_account/add_costumer.php.

Vulnerability

Description

A stored cross-site scripting (XSS) vulnerability has been identified in code-projects Accounting System 1.0. The flaw resides in the costumer_name parameter of the /my_account/add_costumer.php endpoint. The application does not sanitize or validate user-supplied input before storing it in the database and later rendering it in the web interface without proper output encoding [1].

Attack

Vector

An attacker can submit a malicious JavaScript payload in the costumer_name field when adding a new customer record. No special privileges or network position are required beyond the ability to access the web application interface remotely. The injected script persists in the database and executes automatically in the browser of any authenticated user who views the stored data [1].

Impact

Successful exploitation allows arbitrary JavaScript execution in the victim's browser context. This can lead to session hijacking, credential theft, or unauthorized actions on behalf of the authenticated user, such as modifying financial records or extracting sensitive data [1].

Mitigation

As of the publication date (2026-03-26), the vendor has not released a patch. Users should implement input validation and output encoding for the costumer_name parameter, apply Content Security Policy headers, and set HttpOnly and Secure flags on cookies to reduce risk [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.