VYPR
Medium severity4.3NVD Advisory· Published Apr 29, 2026· Updated Apr 29, 2026

CVE-2026-7401

CVE-2026-7401

Description

A vulnerability was detected in SourceCodester CET Automated Grading System with AI Predictive Analytics 1.0. This vulnerability affects unknown code of the file /index.php?action=register of the component Registration. The manipulation of the argument student_id/full_name/section/username results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in SourceCodester CET Automated Grading System 1.0 allows unauthenticated attackers to inject JavaScript via registration fields, triggering in the admin dashboard.

Vulnerability

Overview

A stored cross-site scripting (XSS) vulnerability has been identified in SourceCodester CET Automated Grading System with AI Predictive Analytics version 1.0. The flaw resides in the student self-registration functionality at /index.php?action=register, where the student_id, full_name, section, and username parameters are not sanitized or encoded before being stored in the database [1]. This lacks proper input validation and output encoding, fulfilling the conditions for CWE-79 (Improper Neutralization of Input During Web Page Generation).

Exploitation

An unauthenticated attacker can remotely exploit this vulnerability by submitting a registration request containing JavaScript payloads in any of the vulnerable fields [1]. No login is not required as the registration portal is publicly accessible [1]. The stored payload is subsequently triggered when an administrator visits the dashboard page (/index.php?action=dashboard), where registered students are listed [1]. The attack requires administrator interaction—no special network position beyond standard web access.

Impact

When the administrator views the dashboard, the injected script executes in the context of the admin session [1]. This enables an attacker to steal session cookies, deface the interface, or redirect the admin to malicious sites. Because the payload runs in a privileged session, full administrative account takeover is possible, leading to complete compromise of the grading system's administrative functionality [1].

Mitigation

As of publication, vendor has not released an official patch [1]. Users should apply input validation and output encoding on the registration form, implement output encoding when rendering student data on the dashboard, and consider restricting public registration if not required. The proof-of-concept has been publicly available since April 2026 [1], increasing the risk of active exploitation.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.