VYPR
Medium severityNVD Advisory· Published May 11, 2026· Updated May 12, 2026

CVE-2026-6909

CVE-2026-6909

Description

ATutor is vulnerable to Reflected XSS in /install/upgrade.php endpoint. An attacker can provide a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser.

Product is no longer actively supported. Maintainers of this project were notified early about this vulnerability, but did not respond with the details of the vulnerability or vulnerable version range. Only version 2.2.4 was tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS vulnerability in ATutor /install/upgrade.php allows arbitrary JavaScript execution via crafted URL; software is end-of-life but not patched.

Vulnerability

Overview

CVE-2026-6909 describes a reflected cross-site scripting (XSS) vulnerability in the /install/upgrade in ATutor, an open-source learning management system, specifically in the /install/upgrade.php` endpoint. The software fails to properly neutralize user input during web page generation [1], meaning that an attacker can supply a specially crafted a URL containing malicious script code that, when visited by a victim, is reflected back and executed in the browser. This is classified under CWE-79: Improper Neutralization of Input During Web Page Generation.

Attack

Scenario

The vulnerability is triggered through a crafted URL. An attacker can be delivered via phishing, social engineering, or other means. The attacker does not require authentication to exploit this flaw—the victim simply needs to click the link while logged into an ATutor session for the script to execute. The tested version is 2.2.4.4, but other versions may also be affected [1]. The product is no longer actively supported [1][2], and no fix has been released, and maintainers did not respond to notifications about this vulnerability.

Impact

Successful exploitation results in arbitrary JavaScript execution in the context of the victim's browser and victim's browser on the ATutor domain. This can lead to session hijacking, theft of credentials, defacement, or redirection, or other malicious actions depending on the attacker's payload. Because ATutor is an LMS, sensitive user data and course materials may be accessible.

Mitigation and

Status

No patch is available, and the software is end-of-life [2]. Users are strongly advised to discontinue use or isolate instances from untrusted networks. No workaround has been provided by the vendor. The vulnerability has been publicly reported by CERT Polska . Polska [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.