VYPR
Low severity3.5NVD Advisory· Published Apr 2, 2026· Updated Apr 29, 2026

CVE-2026-5325

CVE-2026-5325

Description

A vulnerability was determined in SourceCodester Simple Customer Relationship Management System 1.0. This issue affects some unknown processing of the file /create-ticket.php of the component Create Ticket. This manipulation of the argument Description causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A cross-site scripting (XSS) vulnerability in SourceCodester Simple CRM System 1.0 allows remote attackers to inject arbitrary script via the Description parameter in /create-ticket.php.

Vulnerability

Overview A reflected or stored cross-site scripting (XSS) vulnerability exists in SourceCodester Simple Customer Relationship Management System 1.0. The issue occurs in the /create-ticket.php file, where the Description parameter is not properly sanitized before being processed. This allows an attacker to inject malicious JavaScript or HTML code that will be executed in the context of the victim's browser.[1]

Exploitation

An attacker can exploit this vulnerability by sending a crafted HTTP request to the /create-ticket.php endpoint with a malicious payload in the Description field. No authentication is explicitly required, but the victim must view the affected ticket for the script to execute. Since the exploit has been publicly disclosed, exploitation is straightforward for an attacker with network access to the application.

Impact

The vulnerability carries a CVSS v3 base score of 3.5 (Low), indicating limited impact. Successful exploitation could lead to client-side attacks such as session hijacking, defacement, or phishing, but likely requires user interaction (e.g., an administrator viewing a ticket) and is constrained by browser security mechanisms.

Mitigation

As of the publication date, no official patch has been released. The vendor (SourceCodester) provides free source code projects, and users are advised to implement input validation and output encoding for the Description field. Given the low severity and public exploit availability, organizations using this system should consider applying a web application firewall (WAF) rule or upgrading to a supported version.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.