CVE-2026-1421
📋 TL;DR
This vulnerability allows attackers to inject malicious scripts into the Online Examination System 1.0 through the 'Add Pages' component. When users view affected pages, the scripts execute in their browsers, potentially stealing session cookies or redirecting to malicious sites. Anyone using code-projects Online Examination System 1.0 is affected.
💻 Affected Systems
- code-projects Online Examination System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal administrator credentials, take over the examination system, manipulate exam results, or install backdoors for persistent access.
Likely Case
Attackers steal user session cookies to impersonate legitimate users, potentially accessing sensitive exam data or student information.
If Mitigated
With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers.
🎯 Exploit Status
Exploit details are publicly available on GitHub, making it easy for attackers to craft XSS payloads.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch available. Implement input validation and output encoding in the 'Add Pages' component code.
🔧 Temporary Workarounds
Implement Input Validation
allAdd server-side validation to sanitize all user inputs in the 'Add Pages' component.
Enable Content Security Policy
allImplement CSP headers to restrict script execution sources.
Header set Content-Security-Policy "default-src 'self'; script-src 'self'"
Header set X-Content-Type-Options "nosniff"
🧯 If You Can't Patch
- Disable the 'Add Pages' functionality if not essential
- Implement a web application firewall (WAF) with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Test the 'Add Pages' feature by submitting a script payload like <script>alert('XSS')</script> and check if it executes when viewing the page.
Check Version:
Check the system's documentation or configuration files for version information.
Verify Fix Applied:
After implementing fixes, test with the same XSS payload to ensure it's properly sanitized and doesn't execute.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to add pages with script tags or JavaScript code in parameters
- Multiple failed attempts with suspicious payloads
Network Indicators:
- HTTP requests containing <script> tags or JavaScript in POST data to add pages endpoints
SIEM Query:
source="web_logs" AND (http_method="POST" AND uri_path="*add*page*" AND (http_content="*<script>*" OR http_content="*javascript:*"))