CVE-2026-4596
Received Received - Intake
Cross-Site Scripting in Lawyer Management System /lawyers.php

Publication date: 2026-03-23

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in projectworlds Lawyer Management System 1.0. This issue affects some unknown processing of the file /lawyers.php. The manipulation of the argument first_Name leads to cross site scripting. The attack may be initiated remotely. The exploit is publicly available and might be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
projectworlds online_lawyer_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-4596 is a stored Cross-Site Scripting (XSS) vulnerability in Projectworlds Lawyer Management System version 1.0. It occurs because the application does not properly sanitize the user input in the first_Name parameter during lawyer registration. This input is stored directly in the database without filtering or escaping. Later, when the list of lawyers is displayed on the lawyers.php page, the stored malicious input is output directly into the HTML without proper encoding, allowing arbitrary JavaScript code to execute in the browsers of users visiting that page.

An attacker can exploit this by registering a lawyer account with a malicious script in the first name field. When other users view the lawyers listing, the malicious script runs, potentially stealing session cookies, hijacking sessions, performing unauthorized actions, defacing the website, redirecting users to malicious sites, or disclosing sensitive information.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to execute malicious scripts in the context of your website users. This can lead to session cookie theft and session hijacking, enabling attackers to impersonate legitimate users.

Other impacts include unauthorized actions performed on behalf of users, website defacement, redirection to malicious websites, disclosure of sensitive information, and further attacks targeting other users.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the input handling of the first_Name parameter during lawyer registration and observing if malicious scripts are executed when viewing the lawyers.php page.'}, {'type': 'paragraph', 'content': 'A practical detection method is to register a lawyer account with a payload such as <img src=x onerror=alert(document.cookie)> in the first_Name field and then visit the lawyers listing page to see if the script executes.'}, {'type': 'paragraph', 'content': 'For command-line detection, you can use curl or similar tools to send a crafted HTTP POST request to the registration endpoint and then fetch the lawyers.php page to check for script injection.'}, {'type': 'list_item', 'content': 'curl -X POST -d "first_Name=<img src=x onerror=alert(document.cookie)>" http://target/lawyer_registation.php'}, {'type': 'list_item', 'content': "curl http://target/lawyers.php | grep '<img src=x onerror=alert(document.cookie)>'"}, {'type': 'paragraph', 'content': 'If the payload appears unencoded in the response and triggers script execution in a browser, the vulnerability is present.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include implementing proper output encoding and input validation to prevent malicious scripts from being stored and executed.'}, {'type': 'list_item', 'content': "Use PHP's htmlspecialchars() function with the ENT_QUOTES flag on all user-controlled data before outputting it on pages like lawyers.php."}, {'type': 'list_item', 'content': 'Validate and sanitize inputs on the server side to restrict allowed characters in the first_Name field.'}, {'type': 'list_item', 'content': 'Implement a strong Content Security Policy (CSP) header to restrict the sources from which scripts can be executed.'}, {'type': 'list_item', 'content': "Set the HttpOnly flag on session cookies to prevent client-side scripts from accessing them, for example using session_set_cookie_params(['httponly' => true]); session_start(); in PHP."}, {'type': 'list_item', 'content': 'Conduct regular security audits and penetration testing to identify and fix similar vulnerabilities.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart