LOWCVE-2026-4626CVSS 3.5

Vulnerabilidade de Cross Site Scripting (XSS) em projectworlds Lawyer Management System lawyer_booking.php

Plataforma

php

Componente

collection-of-vulnerability

Corrigido em

1.0.1

AI Confidence: highNVDEPSS 0.0%Revisado: mai. de 2026
Traduzindo para o seu idioma…

A cross-site scripting (XSS) vulnerability has been identified in the Lawyer Management System, specifically affecting version 1.0. This flaw resides within the /lawyer_booking.php file and allows attackers to inject malicious scripts through manipulation of the Description argument. Successful exploitation could lead to session hijacking or defacement of the application, impacting user data and system integrity. The vulnerability has been publicly disclosed.

Impacto e Cenários de Ataquetraduzindo…

The XSS vulnerability in Lawyer Management System allows an attacker to inject arbitrary JavaScript code into the application's response. This code executes within the context of the user's browser, potentially allowing the attacker to steal session cookies, redirect the user to a malicious website, or deface the application's interface. The impact is particularly severe if the application handles sensitive user data, such as client information or legal documents, as the attacker could potentially gain access to this data. Given the nature of legal management systems, the potential for data breaches and reputational damage is significant. The remote nature of the exploit means an attacker does not need to be on the same network as the vulnerable system.

Contexto de Exploraçãotraduzindo…

This vulnerability has been publicly disclosed, increasing the likelihood of exploitation. No KEV listing is currently available. Public proof-of-concept (PoC) code is likely to emerge, further facilitating exploitation. The vulnerability was published on 2026-03-24, indicating a relatively recent discovery.

Quem Está em Riscotraduzindo…

Law firms and legal professionals utilizing the Lawyer Management System version 1.0 are at risk. Organizations with limited security resources or those relying on unpatched software are particularly vulnerable. Shared hosting environments where multiple clients share the same server could also be affected, as a compromise of one client's instance could potentially impact others.

Passos de Detecçãotraduzindo…

• php / web:

grep -r "Description = " /var/www/lawyer_management_system/

• generic web:

curl -I http://your-lawyer-management-system/lawyer_booking.php?Description=<script>alert(1)</script>

Linha do Tempo do Ataque

  1. Disclosure

    disclosure

Inteligência de Ameaças

Status do Exploit

Prova de ConceitoDesconhecido
CISA KEVNO
Exposição na InternetAlta

EPSS

0.03% (percentil 8%)

CISA SSVC

Exploraçãopoc
Automatizávelno
Impacto Técnicopartial

Vetor CVSS

INTELIGÊNCIA DE AMEAÇAS· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R3.5LOWAttack VectorNetworkComo o atacante alcança o alvoAttack ComplexityLowCondições necessárias para explorarPrivileges RequiredLowNível de autenticação necessárioUser InteractionRequiredSe a vítima precisa tomar uma açãoScopeUnchangedImpacto além do componente afetadoConfidentialityNoneRisco de exposição de dados sensíveisIntegrityLowRisco de modificação não autorizada de dadosAvailabilityNoneRisco de interrupção de serviçonextguardhq.com · Pontuação Base CVSS v3.1
O que significam essas métricas?
Attack Vector
Rede — explorável remotamente pela internet. Sem acesso físico ou local necessário.
Attack Complexity
Baixa — sem condições especiais. O atacante pode explorar de forma confiável.
Privileges Required
Baixo — qualquer conta de usuário válida é suficiente.
User Interaction
Necessária — a vítima deve abrir um arquivo, clicar em um link ou visitar uma página.
Scope
Inalterado — impacto limitado ao componente vulnerável.
Confidentiality
Nenhum — sem impacto na confidencialidade.
Integrity
Baixo — o atacante pode modificar alguns dados com alcance limitado.
Availability
Nenhum — sem impacto na disponibilidade.

Software Afetado

Componentecollection-of-vulnerability
Fornecedorprojectworlds
Faixa afetadaCorrigido em
1.0 – 1.01.0.1

Classificação de Fraqueza (CWE)

Linha do tempo

  1. Reservado
  2. Publicada
  3. Modificada
  4. EPSS atualizado
Sem correção — 61 dias desde a divulgação

Mitigação e Soluções Alternativastraduzindo…

The primary mitigation for CVE-2026-4626 is to upgrade to a patched version of the Lawyer Management System. If upgrading is not immediately feasible, implement robust input validation and output encoding on the Description field in /lawyer_booking.php. Specifically, sanitize user-supplied input to remove or escape potentially malicious characters. Consider implementing a Content Security Policy (CSP) to restrict the sources from which scripts can be executed. Regularly review and update the application's security configuration to minimize the attack surface.

Como corrigir

Atualizar para uma versão corrigida ou implementar medidas de saneamento de entrada para evitar a execução de código XSS. Validar e escapar as entradas do usuário, especialmente o campo 'Description' em lawyer_booking.php.

Boletim de Segurança CVE

Análise de vulnerabilidades e alertas críticos diretamente no seu e-mail.

Perguntas frequentestraduzindo…

What is CVE-2026-4626 — XSS in Lawyer Management System?

CVE-2026-4626 is a cross-site scripting (XSS) vulnerability affecting Lawyer Management System version 1.0, allowing attackers to inject malicious scripts via the /lawyer_booking.php file.

Am I affected by CVE-2026-4626 in Lawyer Management System?

If you are using Lawyer Management System version 1.0, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible.

How do I fix CVE-2026-4626 in Lawyer Management System?

The recommended fix is to upgrade to a patched version of the Lawyer Management System. As a temporary workaround, implement input validation and output encoding on the Description field.

Is CVE-2026-4626 being actively exploited?

While active exploitation is not confirmed, the vulnerability has been publicly disclosed, increasing the risk of exploitation.

Where can I find the official Lawyer Management System advisory for CVE-2026-4626?

Refer to the projectworlds website or relevant security mailing lists for the official advisory regarding CVE-2026-4626.

Seu projeto está afetado?

Envie seu arquivo de dependências e descubra na hora se esta e outras CVEs te atingem.