VYPR
Low severity3.5NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7222

CVE-2026-7222

Description

A vulnerability was determined in code-projects Coaching Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /cims/modules/student/complaint.php of the component Complaint Form Page. This manipulation of the argument Complaint causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in code-projects Coaching Management System 1.0 via complaint form allows admin session theft and account takeover.

Vulnerability

Overview A stored cross-site scripting (XSS) vulnerability exists in the Coaching Management System 1.0 from code-projects. The flaw resides in the complaint submission functionality (file /cims/modules/student/complaint.php) and the related reply feature. User input in the complaint and reply fields is not properly sanitized before being stored and later rendered in the admin panel (/modules/admin/incomingcomplaint.php) and student views [1]. This is a classic case of CWE-79: Improper Neutralization of Input During Web Page Generation.

Exploitation

Path An attacker with a low-privileged student account can submit a malicious JavaScript payload in the complaint field. When an administrator or teacher views the complaint, the payload executes automatically in their browser. For example, a payload can exfiltrate the session cookie (PHPSESSID) to an attacker-controlled server. Similarly, an admin can inject script in replies that executes in student sessions, enabling reverse XSS [1]. The attack requires no special privileges beyond a standard user account and can be performed remotely.

Impact

Successful exploitation allows the attacker to steal session cookies of higher-privileged users. With the admin’s session cookie, the attacker can hijack the admin session, gaining full control over the application. This can lead to account takeover, data exfiltration, and further malicious actions within the system. The PoC provided in the advisory confirms JavaScript execution and cookie theft in the admin panel [1].

Mitigation

Status As of the vulnerability disclosure, no patch has been released by the vendor. The software appears to be in a maintenance-only state. Users are advised to implement input sanitization and output encoding, or consider replacing the system. The exploit has been publicly disclosed and is likely to be used in attacks [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.