VYPR
Medium severity4.3NVD Advisory· Published Apr 1, 2026· Updated Apr 29, 2026

CVE-2026-5240

CVE-2026-5240

Description

A security vulnerability has been detected in code-projects BloodBank Managing System 1.0. This affects an unknown part of the file /admin_state.php. The manipulation of the argument statename leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in code-projects Blood Bank Managing System 1.0 via unsanitized statename parameter in /admin_state.php allows remote attackers to inject arbitrary scripts.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability has been identified in code-projects Blood Bank Managing System version 1.0. The flaw resides in the administrative state management functionality, specifically within the file /admin_state.php. The application fails to properly sanitize user input supplied through the statename parameter before storing it in the backend database [1].

Exploitation

Details

An attacker can exploit this vulnerability by sending a crafted HTTP POST request to the affected endpoint with malicious JavaScript or HTML embedded in the statename parameter. No authentication is required to trigger the stored XSS, as the endpoint is accessible remotely. The injected payload is stored in the database and later rendered without output encoding when an administrator or other user views the state management page, causing the script to execute in their browser [1].

Impact

Successful exploitation allows an attacker to execute arbitrary scripts in the context of the victim's browser session. This can lead to session hijacking, defacement of the administrative interface, or theft of sensitive information such as cookies or credentials. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation) and has been assigned a CVSS v3 base score of 4.3 (Medium) [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. The vendor's homepage is referenced in the advisory [2]. Users are advised to apply input validation and output encoding (e.g., htmlspecialchars()) to the statename parameter, or to restrict access to the administrative interface until a fix is available. The exploit has been publicly disclosed, increasing the risk of active exploitation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.