VYPR
Medium severityNVD Advisory· Published May 11, 2026· Updated May 12, 2026

CVE-2026-6956

CVE-2026-6956

Description

ATutor is vulnerable to Reflected XSS in /install/install.php endpoint. An attacker can provide a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser.

Product is no longer actively supported. Maintainers of this project were notified early about this vulnerability, but did not respond with the details of the vulnerability or vulnerable version range. Only version 2.2.4 was tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ATutor 2.2.4 is vulnerable to reflected XSS in /install/install.php, allowing arbitrary JavaScript execution via crafted URLs.

Details

CVE-2026-6956 describes a reflected cross-site scripting (XSS) vulnerability in the /install/install.php endpoint of ATutor, an open-source learning management system. The vulnerability arises from improper neutralization of user-supplied input during web page generation (CWE-79), allowing an attacker to inject arbitrary JavaScript code into the response. Only version 2.2.4 was tested and confirmed vulnerable, but other versions may also be affected. The product is no longer actively supported [1].

Exploitation

An attacker can craft a malicious URL that, when visited by a victim, triggers the XSS payload via the install.php script. The attack does not require authentication or any special network position; the victim simply needs to click the link. Since the vulnerability is reflected, the payload is not stored on the server but delivered directly in the response [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, data theft, defacement, or redirection to malicious sites. The impact is limited to the victim's session and does not directly affect the server or other users [1].

Mitigation

No official patch has been released because ATutor is no longer actively maintained. Users are advised to discontinue use of ATutor or implement web application firewall (WAF) rules to block malicious requests to /install/install.php. Additionally, administrators should restrict access to the installation script and consider migrating to a supported LMS platform [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.