CVE-2026-1700

3.5 LOW

📋 TL;DR

This vulnerability allows remote attackers to inject malicious scripts via the Message parameter in the /app/sms.php file of projectworlds House Rental and Property Listing 1.0. The cross-site scripting (XSS) attack can be executed without authentication, potentially affecting all users who interact with the vulnerable application. Attackers could steal session cookies, redirect users to malicious sites, or perform actions on behalf of authenticated users.

💻 Affected Systems

Products:
  • projectworlds House Rental and Property Listing
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires the /app/sms.php endpoint to be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain full control of the application, deface websites, or redirect users to phishing/malware sites, potentially leading to complete system compromise and data theft.

🟠

Likely Case

Attackers will likely use this to steal user session cookies, perform account takeover, or redirect users to malicious content, resulting in unauthorized access and potential data exposure.

🟢

If Mitigated

With proper input validation and output encoding, the impact is limited to failed exploitation attempts with no successful XSS execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit is publicly available and requires minimal technical skill to execute. Attack can be performed remotely without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

1. Check vendor website for security updates
2. If patch available, download and apply
3. Test functionality after patching
4. Monitor for any issues

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and sanitization of the Message parameter to remove or encode malicious scripts

Modify /app/sms.php to include: htmlspecialchars($_POST['Message'], ENT_QUOTES, 'UTF-8')

Web Application Firewall (WAF)

all

Deploy WAF rules to block XSS payloads targeting the /app/sms.php endpoint

Configure WAF to block patterns like: <script>, javascript:, onload=, etc.

🧯 If You Can't Patch

  • Disable or restrict access to /app/sms.php endpoint if not required
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Test by sending XSS payload to /app/sms.php endpoint: curl -X POST -d 'Message=<script>alert(1)</script>' http://target/app/sms.php

Check Version:

Check application configuration files or admin panel for version information

Verify Fix Applied:

Test with same payload after fix - script should be encoded or blocked, not executed

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /app/sms.php containing script tags or javascript payloads
  • Unusual parameter values in Message field

Network Indicators:

  • HTTP POST requests to /app/sms.php with suspicious payloads
  • Outbound connections to unknown domains after XSS execution

SIEM Query:

source="web_logs" AND uri="/app/sms.php" AND (Message CONTAINS "<script>" OR Message CONTAINS "javascript:")

🔗 References

📤 Share & Export