CVE-2026-3984
Received Received - Intake
Cross-Site Scripting in Campcodes Athletic Meet Result System

Publication date: 2026-03-12

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in Campcodes Division Regional Athletic Meet Game Result Matrix System 2.1. This vulnerability affects unknown code of the file save_up_athlete.php. This manipulation of the argument a_name causes cross site scripting. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-12
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-12
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
campcodes division_regional_athletic_meet_game_result_matrix_system 2.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying instances of the vulnerable file save_up_athlete.php in the Campcodes Division Regional Athletic Meet Game Result Matrix System version 2.1 and testing the "a_name" parameter for improper input sanitization that leads to cross-site scripting (XSS).'}, {'type': 'paragraph', 'content': 'One method to find potentially vulnerable targets is to use Google dorking with queries such as: inurl:save_up_athlete.php'}, {'type': 'paragraph', 'content': 'To test the vulnerability on your system, you can attempt to inject a simple XSS payload into the "a_name" parameter, for example: <a href="javascript:alert(1)">test</a>, and observe if the script executes upon page refresh.'}, {'type': 'paragraph', 'content': 'For network or system scanning, you can use tools like curl or wget to send crafted HTTP requests to the vulnerable endpoint and check the response for reflected or stored scripts.'}, {'type': 'list_item', 'content': 'Example curl command to test injection: curl -X POST -d "a_name=<a href=\\"javascript:alert(1)\\">test</a>" https://target-domain/save_up_athlete.php'}] [3, 1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include sanitizing and validating all user inputs, especially the "a_name" parameter in save_up_athlete.php, to prevent injection of malicious scripts.'}, {'type': 'paragraph', 'content': 'Since no known mitigations or countermeasures have been documented for this vulnerability, it is recommended to replace or update the affected component with a secure alternative if possible.'}, {'type': 'paragraph', 'content': 'Additionally, restricting user input to safe characters and implementing Content Security Policy (CSP) headers can help reduce the impact of potential XSS attacks.'}, {'type': 'paragraph', 'content': 'Monitoring and blocking suspicious requests targeting the vulnerable parameter can also help mitigate exploitation attempts.'}] [3]


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-3984 is a cross-site scripting (XSS) vulnerability found in version 2.1 of the Campcodes Division Regional Athletic Meet Game Result Matrix System, specifically in the file save_up_athlete.php.'}, {'type': 'paragraph', 'content': 'The vulnerability arises from improper handling of the user-controllable input parameter "a_name," which is not properly sanitized or neutralized before being included in the web page output.'}, {'type': 'paragraph', 'content': 'This flaw allows remote attackers to inject malicious scripts that are stored on the server and executed in the browsers of users who access the affected data.'}, {'type': 'paragraph', 'content': 'Exploitation is straightforward, can be performed remotely without local access, but requires user interaction.'}] [1, 2, 3]


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to arbitrary script execution in the browsers of users interacting with the affected system.

This can compromise user security and privacy by allowing attackers to execute malicious scripts, potentially stealing sensitive information or performing unauthorized actions on behalf of users.

Since the malicious scripts are stored on the server and executed when users access the affected pages, it can affect multiple users and lead to broader security issues.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart