CVE-2026-4596
Cross-Site Scripting in Lawyer Management System /lawyers.php
Publication date: 2026-03-23
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| projectworlds | online_lawyer_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-4596 is a stored Cross-Site Scripting (XSS) vulnerability in Projectworlds Lawyer Management System version 1.0. It occurs because the application does not properly sanitize the user input in the first_Name parameter during lawyer registration. This input is stored directly in the database without filtering or escaping. Later, when the list of lawyers is displayed on the lawyers.php page, the stored malicious input is output directly into the HTML without proper encoding, allowing arbitrary JavaScript code to execute in the browsers of users visiting that page.
An attacker can exploit this by registering a lawyer account with a malicious script in the first name field. When other users view the lawyers listing, the malicious script runs, potentially stealing session cookies, hijacking sessions, performing unauthorized actions, defacing the website, redirecting users to malicious sites, or disclosing sensitive information.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute malicious scripts in the context of your website users. This can lead to session cookie theft and session hijacking, enabling attackers to impersonate legitimate users.
Other impacts include unauthorized actions performed on behalf of users, website defacement, redirection to malicious websites, disclosure of sensitive information, and further attacks targeting other users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the input handling of the first_Name parameter during lawyer registration and observing if malicious scripts are executed when viewing the lawyers.php page.'}, {'type': 'paragraph', 'content': 'A practical detection method is to register a lawyer account with a payload such as <img src=x onerror=alert(document.cookie)> in the first_Name field and then visit the lawyers listing page to see if the script executes.'}, {'type': 'paragraph', 'content': 'For command-line detection, you can use curl or similar tools to send a crafted HTTP POST request to the registration endpoint and then fetch the lawyers.php page to check for script injection.'}, {'type': 'list_item', 'content': 'curl -X POST -d "first_Name=<img src=x onerror=alert(document.cookie)>" http://target/lawyer_registation.php'}, {'type': 'list_item', 'content': "curl http://target/lawyers.php | grep '<img src=x onerror=alert(document.cookie)>'"}, {'type': 'paragraph', 'content': 'If the payload appears unencoded in the response and triggers script execution in a browser, the vulnerability is present.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation steps include implementing proper output encoding and input validation to prevent malicious scripts from being stored and executed.'}, {'type': 'list_item', 'content': "Use PHP's htmlspecialchars() function with the ENT_QUOTES flag on all user-controlled data before outputting it on pages like lawyers.php."}, {'type': 'list_item', 'content': 'Validate and sanitize inputs on the server side to restrict allowed characters in the first_Name field.'}, {'type': 'list_item', 'content': 'Implement a strong Content Security Policy (CSP) header to restrict the sources from which scripts can be executed.'}, {'type': 'list_item', 'content': "Set the HttpOnly flag on session cookies to prevent client-side scripts from accessing them, for example using session_set_cookie_params(['httponly' => true]); session_start(); in PHP."}, {'type': 'list_item', 'content': 'Conduct regular security audits and penetration testing to identify and fix similar vulnerabilities.'}] [1]