Plattform
php
Komponente
student-management-system
Behoben in
1.0.1
A cross-site scripting (XSS) vulnerability has been identified in Cyber-III Student-Management-System, affecting versions up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. This flaw allows attackers to inject malicious scripts into web pages viewed by other users, potentially leading to session hijacking or defacement. Due to the product's rolling release model, specific affected and updated versions are not available. The project has been notified of the issue.
Successful exploitation of CVE-2026-5644 allows an attacker to inject arbitrary JavaScript code into the Cyber-III Student-Management-System application. This can be leveraged to steal user cookies, redirect users to malicious websites, or modify the content of the application. The attack is remotely exploitable, meaning an attacker does not need to be authenticated to trigger the vulnerability. Given the nature of XSS, the blast radius extends to any user who interacts with the affected page, potentially compromising sensitive student data and administrative accounts. The availability of a public exploit significantly increases the risk of widespread exploitation.
CVE-2026-5644 has been publicly disclosed and a proof-of-concept exploit is available, indicating a high probability of exploitation. The vulnerability is not currently listed on CISA KEV, but its public nature warrants close monitoring. The low CVSS score reflects the relatively limited impact, but the ease of exploitation and potential for widespread compromise make it a significant concern.
Educational institutions and organizations utilizing Cyber-III Student-Management-System are at risk, particularly those relying on the system for sensitive student data management. Organizations with legacy configurations or those lacking robust input validation practices are especially vulnerable. Shared hosting environments where multiple users share the same server resources may also face increased risk due to the potential for cross-tenant exploitation.
• php: Examine the /admin/Add%20notice/batch-notice.php file for insecure handling of the $SERVER['PHPSELF'] variable. Look for missing or inadequate input validation.
grep -r $_SERVER['PHP_SELF'] /var/www/html/admin/Add%20notice/• generic web: Monitor access logs for unusual requests targeting /admin/Add%20notice/batch-notice.php with suspicious parameters.
grep "/admin/Add%20notice/batch-notice.php?" /var/log/apache2/access.log• generic web: Check response headers for signs of injected JavaScript code.
curl -I https://example.com/admin/Add%20notice/batch-notice.php?param=<script>alert(1)</script>disclosure
poc
Exploit-Status
EPSS
0.03% (9% Perzentil)
CISA SSVC
CVSS-Vektor
Due to the rolling release nature of Cyber-III Student-Management-System, a specific patched version is not yet available. Immediate mitigation strategies involve implementing robust input validation and output encoding on the /admin/Add%20notice/batch-notice.php endpoint. Specifically, sanitize the $SERVER['PHPSELF'] parameter to prevent malicious script injection. Consider using a Web Application Firewall (WAF) with XSS filtering rules to block suspicious requests. Regularly review and update the application's security configuration to minimize the attack surface. After implementing these mitigations, verify functionality by attempting to inject a simple XSS payload (e.g., <script>alert('XSS')</script>) and confirming it is blocked.
Aktualisieren Sie das Student-Management-System auf eine korrigierte Version. Aufgrund der Art der kontinuierlichen Updates konsultieren Sie bitte die Dokumentation des Anbieters oder wenden Sie sich an den Support, um Informationen zu korrigierten Versionen und Upgrade-Schritten zu erhalten. Das Projekt hat nicht auf Problemberichte reagiert, daher ist es entscheidend, die Updates des Anbieters zu überwachen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-5644 is a cross-site scripting (XSS) vulnerability affecting Cyber-III Student-Management-System versions up to 1a938fa61e9f735078e9b291d2e6215b4942af3f, allowing attackers to inject malicious scripts.
If you are using Cyber-III Student-Management-System version 1a938fa61e9f735078e9b291d2e6215b4942af3f or earlier, you are potentially affected by this XSS vulnerability.
Due to the rolling release model, a specific patch is not yet available. Mitigate by implementing strict input validation and output encoding, and consider using a WAF.
A public exploit exists, suggesting active scanning and potential attacks are already underway.
Consult the Cyber-III project website and security mailing lists for the latest advisory regarding CVE-2026-5644.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.