LOWCVE-2026-4596CVSS 3.5

vulnérabilité de cross site scripting (cross site scripting) dans lawyers.php du système de gestion d'avocats projectworlds

Plateforme

php

Composant

collection-of-vulnerability

Corrigé dans

1.0.1

AI Confidence: highNVDEPSS 0.0%Révisé: mai 2026
Traduction vers votre langue…

A cross-site scripting (XSS) vulnerability has been identified in the Lawyer Management System version 1.0. This flaw resides in the processing of the /lawyers.php file, specifically concerning the manipulation of the 'first_Name' argument. Successful exploitation could allow an attacker to inject malicious scripts into the application, potentially compromising user data and session integrity. A public proof-of-concept is available, increasing the risk of exploitation.

Impact et Scénarios d'Attaquetraduction en cours…

The primary impact of CVE-2026-4596 is the potential for cross-site scripting (XSS) attacks. An attacker could inject malicious JavaScript code into the Lawyer Management System through the manipulation of the 'first_Name' parameter within the /lawyers.php file. This injected script could then execute in the context of a legitimate user's browser, allowing the attacker to steal session cookies, redirect users to malicious websites, or deface the application. The remote nature of the exploit means an attacker doesn't need local access to the system to launch the attack. Given the availability of a public proof-of-concept, the risk of exploitation is elevated.

Contexte d'Exploitationtraduction en cours…

CVE-2026-4596 is a relatively low-severity vulnerability, as indicated by its CVSS score of 3.5. However, the availability of a public proof-of-concept significantly increases the likelihood of exploitation. While no active campaigns have been publicly reported, the ease of exploitation makes it a potential target for opportunistic attackers. The vulnerability was publicly disclosed on 2026-03-23.

Qui Est à Risquetraduction en cours…

Organizations utilizing the Lawyer Management System version 1.0, particularly those with publicly accessible instances, are at risk. Shared hosting environments where multiple users share the same server resources are also at increased risk, as a successful exploit on one user's account could potentially compromise others.

Étapes de Détectiontraduction en cours…

• php / web:

grep -r 'first_Name' /var/www/lawyer_management_system/lawyers.php | grep -i '<script'

• generic web:

curl -I http://your-lawyer-management-system/lawyers.php?first_Name=<script>alert(1)</script>

• generic web:

curl -s http://your-lawyer-management-system/lawyers.php?first_Name=<script>alert(1)</script> | grep 'alert(1)'

Chronologie de l'Attaque

  1. Disclosure

    disclosure

Renseignement sur les Menaces

Statut de l'Exploit

Preuve de ConceptInconnu
CISA KEVNO
Exposition InternetÉlevée
Rapports2 rapports de menace

EPSS

0.03% (percentile 8%)

CISA SSVC

Exploitationpoc
Automatisableno
Impact Techniquepartial

Vecteur CVSS

RENSEIGNEMENT SUR LES MENACES· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R3.5LOWAttack VectorNetworkComment l'attaquant atteint la cibleAttack ComplexityLowConditions requises pour exploiterPrivileges RequiredLowNiveau d'authentification requisUser InteractionRequiredSi une action de la victime est requiseScopeUnchangedImpact au-delà du composant affectéConfidentialityNoneRisque d'exposition de données sensiblesIntegrityLowRisque de modification non autorisée de donnéesAvailabilityNoneRisque d'interruption de servicenextguardhq.com · Score de base CVSS v3.1
Que signifient ces métriques?
Attack Vector
Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
Attack Complexity
Faible — aucune condition spéciale requise. Exploitable de manière fiable.
Privileges Required
Faible — tout compte utilisateur valide est suffisant.
User Interaction
Requise — la victime doit ouvrir un fichier, cliquer sur un lien ou visiter une page.
Scope
Inchangé — impact limité au composant vulnérable.
Confidentiality
Aucun — aucun impact sur la confidentialité.
Integrity
Faible — l'attaquant peut modifier certaines données avec un impact limité.
Availability
Aucun — aucun impact sur la disponibilité.

Logiciel Affecté

Composantcollection-of-vulnerability
Fournisseurprojectworlds
Plage affectéeCorrigé dans
1.0 – 1.01.0.1

Classification de Faiblesse (CWE)

Chronologie

  1. Réservé
  2. Publiée
  3. Modifiée
  4. EPSS mis à jour
Sans correctif — 62 jours depuis la divulgation

Mitigation et Contournementstraduction en cours…

The primary mitigation for CVE-2026-4596 is to upgrade to a patched version of the Lawyer Management System. Since a fixed version is not specified, immediate action is crucial. As an interim measure, consider implementing strict input validation and sanitization on the 'first_Name' parameter within the /lawyers.php file. Web application firewalls (WAFs) configured to detect and block XSS payloads can also provide a layer of protection. Regularly review and update WAF rules to ensure they are effective against emerging XSS techniques.

Comment corriger

Mettre à jour vers une version corrigée ou appliquer les mesures de sécurité nécessaires pour éviter l'exécution de code XSS. Valider et nettoyer les entrées utilisateur, en particulier le champ first_Name dans lawyers.php.

Newsletter Sécurité CVE

Analyses de vulnérabilités et alertes critiques directement dans votre boîte mail.

Questions fréquentestraduction en cours…

What is CVE-2026-4596 — XSS in Lawyer Management System?

CVE-2026-4596 is a cross-site scripting (XSS) vulnerability affecting Lawyer Management System version 1.0. It allows attackers to inject malicious scripts through the /lawyers.php file's 'first_Name' parameter.

Am I affected by CVE-2026-4596 in Lawyer Management System?

If you are using Lawyer Management System version 1.0, you are potentially affected. Upgrade to a patched version as soon as possible.

How do I fix CVE-2026-4596 in Lawyer Management System?

Upgrade to a patched version of Lawyer Management System. As an interim measure, implement strict input validation and sanitization on the 'first_Name' parameter and consider using a WAF.

Is CVE-2026-4596 being actively exploited?

While no active campaigns have been confirmed, the availability of a public proof-of-concept suggests a heightened risk of exploitation.

Where can I find the official Lawyer Management System advisory for CVE-2026-4596?

Refer to the projectworlds website or relevant security mailing lists for the official advisory regarding CVE-2026-4596.

Ton projet est-il affecté ?

Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.