VYPR
Medium severity4.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7116

CVE-2026-7116

Description

A security flaw has been discovered in code-projects Employee Management System 1.0. This issue affects some unknown processing of the file 370project/mark.php. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in code-projects Employee Management System 1.0 via the `pid` parameter in `mark.php` allows remote attackers to execute arbitrary JavaScript in an admin's browser, leading to session hijacking or account takeover.

Vulnerability

Description

A reflected cross-site scripting (XSS) vulnerability exists in code-projects Employee Management System version 1.0. The flaw is located in the file 370project/mark.php, specifically in the handling of the pid query parameter. This parameter is reflected into an HTML hidden input value without proper escaping or sanitization, allowing an attacker to inject arbitrary HTML and JavaScript code [1].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious URL containing a specially encoded payload in the pid parameter. For example, a GET request to /mark.php?id=101&pid=%22%3E%3CScRiPt%3Ealert(10)%3C/sCrIpT%3E will cause the injected script to execute when the page is rendered in a victim's browser. The attack does not require authentication and can be carried out remotely, as the endpoint is accessible over HTTP [1].

Impact

Successful exploitation requires an authenticated administrator to visit the malicious link, either via social engineering or other means. Once the script executes, an attacker could steal session cookies or tokens, leading to session hijacking, perform actions on behalf of the admin (account takeover), or manipulate the page content for phishing attacks. The public disclosure of a proof-of-concept exploit code increases the likelihood of active exploitation [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. Users are advised to apply input validation and output encoding for the pid parameter, or consider using a web application firewall (WAF) to block malicious payloads. The vulnerable source code is available from code-projects.org [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.