VYPR
Low severity2.4NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7090

CVE-2026-7090

Description

A vulnerability was detected in code-projects Chat System 1.0. This affects an unknown function of the file /admin/send_message.php of the component Chat Interface. The manipulation of the argument msg results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in code-projects Chat System 1.0 allows authenticated users to inject arbitrary JavaScript via the msg parameter in /admin/send_message.php.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability exists in code-projects Chat System 1.0, affecting the chat interface. The flaw resides in the file /admin/send_message.php, where the msg POST parameter is inserted directly into the database without any sanitization or encoding [1]. The official description confirms the manipulation of the msg argument leads to XSS, and the exploit is publicly available.

Attack

Vector and Exploitation

The attack requires a valid user session (Low privileges) and user interaction—the victim must open the chatroom. The injection occurs at /admin/send_message.php, and the stored payload executes when /admin/fetch_chat.php renders messages without output encoding [1]. Both the message and uname fields are echoed unsafely, allowing persistent payloads to affect all users, including administrators, who view the chatroom.

Impact

An attacker can inject arbitrary JavaScript that executes in the context of any user viewing the chatroom. This can lead to session hijacking, defacement, or redirection to malicious sites. The CVSS v3.1 score of 8.7 (High) reflects the network attack vector, low complexity, and potential for high impact to confidentiality and integrity [1].

Mitigation

Status

As of the publication date, the vendor has not released a patch, and the vulnerability remains unpatched [1]. Users should apply input validation and output encoding (e.g., htmlspecialchars()) to the affected parameters, or restrict access to the chat functionality until a fix is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.