LOWCVE-2026-5668CVSS 2.4

Cyber-III Student-Management-System add%20notice.php cross site scripting

Plattform

php

Komponente

student-management-system

Behoben in

1.0.1

AI Confidence: mediumNVDEPSS 0.0%Geprüft: Mai 2026

CVE-2026-5668 describes a cross-site scripting (XSS) vulnerability discovered in Cyber-III Student-Management-System. This flaw allows attackers to inject malicious scripts into the application, potentially compromising user accounts and data. The vulnerability affects versions up to 1a938fa61e9f735078e9b291d2e6215b4942af3f. Due to the rolling release model, specific fixed versions are not available, requiring mitigation strategies.

Auswirkungen und Angriffsszenarien

Successful exploitation of CVE-2026-5668 enables an attacker to execute arbitrary JavaScript code within the context of a user's browser session. This can lead to various malicious actions, including session hijacking, credential theft, and defacement of the application. An attacker could potentially steal sensitive student data, modify records, or redirect users to phishing sites. The impact is amplified if the application is used in a shared hosting environment, as a compromised instance could potentially affect other tenants. The published exploit increases the likelihood of near-term exploitation.

Ausnutzungskontext

The vulnerability has been publicly disclosed and a proof-of-concept exploit is available, increasing the risk of exploitation. The vulnerability is not currently listed on CISA KEV. The low CVSS score reflects the relatively limited impact and ease of mitigation, but the availability of a public exploit warrants immediate attention. The project was notified of the issue via an issue report.

Wer Ist Gefährdetwird übersetzt…

Organizations utilizing Cyber-III Student-Management-System, particularly those with publicly accessible administrative interfaces, are at risk. Shared hosting environments where multiple users share the same server instance are especially vulnerable, as an attacker could potentially exploit the vulnerability through another user's account.

Erkennungsschrittewird übersetzt…

• generic web: Use curl to test the /admin/Add%20notice/add%20notice.php endpoint with various payloads containing <script> tags. Examine the response for signs of script execution.

curl -X POST -d '<script>alert("XSS")</script>' http://your-target/admin/Add%20notice/add%20notice.php

• generic web: Review access and error logs for unusual patterns or requests containing suspicious characters or script tags. • php: Examine the source code of /admin/Add%20notice/add%20notice.php for inadequate input sanitization of the $SERVER['PHPSELF'] variable.

Angriffszeitlinie

  1. Disclosure

    disclosure

  2. PoC

    poc

Bedrohungsanalyse

Exploit-Status

Proof of ConceptUnbekannt
CISA KEVNO
Internet-ExponierungHoch
Berichte1 Bedrohungsbericht

EPSS

0.03% (9% Perzentil)

CISA SSVC

Ausnutzungpoc
Automatisierbarno
Technische Auswirkungpartial

CVSS-Vektor

BEDROHUNGSANALYSE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R2.4LOWAttack VectorNetworkWie der Angreifer das Ziel erreichtAttack ComplexityLowBedingungen zur erfolgreichen AusnutzungPrivileges RequiredHighErforderliche AuthentifizierungsstufeUser InteractionRequiredOb ein Opfer eine Aktion ausführen mussScopeUnchangedAuswirkungen über die Komponente hinausConfidentialityNoneRisiko der Offenlegung sensibler DatenIntegrityLowRisiko nicht autorisierter DatenänderungAvailabilityNoneRisiko der Dienstunterbrechungnextguardhq.com · CVSS v3.1 Basis-Score
Was bedeuten diese Metriken?
Attack Vector
Netzwerk — aus der Ferne über das Internet ausnutzbar. Kein physischer oder lokaler Zugriff erforderlich.
Attack Complexity
Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
Privileges Required
Hoch — Administrator- oder Privilegienkonto erforderlich.
User Interaction
Erforderlich — Opfer muss eine Datei öffnen, auf einen Link klicken oder eine Seite besuchen.
Scope
Unverändert — Auswirkung auf das anfällige Komponente beschränkt.
Confidentiality
Keine — kein Vertraulichkeitseinfluss.
Integrity
Niedrig — Angreifer kann einige Daten mit begrenztem Umfang ändern.
Availability
Keine — kein Verfügbarkeitseinfluss.

Betroffene Software

Komponentestudent-management-system
HerstellerCyber-III
Betroffener BereichBehoben in
1a938fa61e9f735078e9b291d2e6215b4942af3f – 1a938fa61e9f735078e9b291d2e6215b4942af3f1.0.1

Schwachstellen-Klassifikation (CWE)

Zeitleiste

  1. Reserviert
  2. Veröffentlicht
  3. EPSS aktualisiert
Kein Patch — 48 Tage seit Offenlegung

Mitigation und Workarounds

Given the rolling release nature of Cyber-III Student-Management-System, a direct patch is not immediately available. Mitigation strategies should focus on input validation and output encoding to prevent the injection of malicious scripts. Implement strict input validation on the /admin/Add%20notice/add%20notice.php endpoint, ensuring that the $SERVER['PHPSELF'] argument is properly sanitized. Employ output encoding to prevent the browser from interpreting user-supplied data as executable code. Consider implementing a Web Application Firewall (WAF) with rules to detect and block XSS attempts. Regularly review and update the application's codebase to address potential vulnerabilities.

So beheben

Student-Management-System auf eine korrigierte Version aktualisieren. Da das Projekt ein kontinuierliches Release-Modell verwendet und keine spezifischen Versionsdetails bereitstellt, wenden Sie sich an den Anbieter, um Informationen zu aktualisierten Versionen zu erhalten und die erforderlichen Updates anzuwenden.

CVE-Sicherheitsnewsletter

Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.

Häufig gestellte Fragenwird übersetzt…

What is CVE-2026-5668 — XSS in Cyber-III Student-Management-System?

CVE-2026-5668 is a cross-site scripting (XSS) vulnerability in Cyber-III Student-Management-System versions up to 1a938fa61e9f735078e9b291d2e6215b4942af3f, allowing attackers to inject malicious scripts.

Am I affected by CVE-2026-5668 in Cyber-III Student-Management-System?

If you are using Cyber-III Student-Management-System version 1a938fa61e9f735078e9b291d2e6215b4942af3f or earlier, you are potentially affected by this vulnerability.

How do I fix CVE-2026-5668 in Cyber-III Student-Management-System?

Due to the rolling release model, a direct upgrade may not be immediately available. Implement WAF rules, input validation, and consider CSP as mitigations.

Is CVE-2026-5668 being actively exploited?

A public proof-of-concept exists, suggesting a higher likelihood of active exploitation. Monitor for suspicious activity and apply mitigations promptly.

Where can I find the official Cyber-III Student-Management-System advisory for CVE-2026-5668?

Refer to the project's official communication channels and issue tracker for updates regarding this vulnerability.

Ist dein Projekt betroffen?

Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.