VYPR
Medium severity4.3NVD Advisory· Published Apr 10, 2026· Updated Apr 29, 2026

CVE-2026-6034

CVE-2026-6034

Description

A flaw has been found in code-projects Vehicle Showroom Management System 1.0. Impacted is an unknown function of the file /BranchManagement/ProfitAndLossReport.php. Executing a manipulation of the argument BRANCH_ID can lead to cross site scripting. The attack may be launched remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Vehicle Showroom Management System 1.0 suffers from a reflected XSS in ProfitAndLossReport.php via the BRANCH_ID parameter, allowing unauthenticated remote attackers to inject arbitrary scripts.

Vulnerability

Overview

A reflected cross-site scripting (XSS) vulnerability has been identified in code-projects Vehicle Showroom Management System version 1.0. The flaw resides in the /BranchManagement/ProfitAndLossReport.php file, where the BRANCH_ID parameter is` parameter is processed. The root cause is the application's failure to properly validate user input and encode output before rendering it on the web page, allowing an attacker to inject arbitrary HTML or JavaScript code [1].

Attack

Vector

The vulnerability can be exploited remotely without any authentication or prior authorization. An attacker crafts a malicious URL containing a payload in the BRANCH_ID parameter, such as ``. When a victim visits this crafted URL, the injected script executes in the context of the victim's browser session [1].

Impact

Successful exploitation enables an attacker to perform a range of malicious actions, including stealing cookies, session tokens, or other sensitive information, performing actions on behalf of the victim, defacing web pages, redirecting users to malicious sites, or gaining control over the victim's browser. This poses a serious threat to user privacy and system security [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. The project is available for download from code-projects.org [2]. Users are advised to apply input sanitization and output encoding for the BRANCH_ID parameter, or to restrict access to the vulnerable script until a fix is provided.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.