CVE-2026-6486
Cross-Site Scripting in ClassroomBookings User Display Name Handler
Publication date: 2026-04-17
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| classroombookings | classroombookings | to 2.17.0 (inc) |
| classroombookings | classroombookings | 2.17.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the classroombookings software up to version 2.17.0, specifically in the User Display Name Handler component within the file crbs-core/application/views/layout.php. It involves the manipulation of the 'displayname' argument, which leads to a cross-site scripting (XSS) vulnerability. This means an attacker can inject malicious scripts that execute in the context of a user's browser. The attack can be performed remotely.
The vulnerability has been publicly disclosed and an exploit is available. The issue is fixed in version 2.17.1 by applying a patch identified as 69c3c9bb8a17f1ea572d8f4502bf238f0214c98a.
How can this vulnerability impact me? :
This cross-site scripting vulnerability can allow an attacker to execute malicious scripts in the context of users who view the affected display name. This can lead to unauthorized actions such as stealing session cookies, redirecting users to malicious sites, or performing actions on behalf of the user without their consent.
Since the attack can be executed remotely, it poses a risk to any user interacting with the vulnerable application, potentially compromising user data and trust.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to upgrade the affected component classroombookings to version 2.17.1, which contains the fix.
This upgrade addresses the cross site scripting vulnerability in the User Display Name Handler component.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is a cross site scripting (XSS) issue in the User Display Name Handler component of classroombookings. This type of vulnerability can potentially be exploited to perform unauthorized actions or steal user information, which may impact the confidentiality and integrity of user data.
However, there is no specific information provided about how this vulnerability directly affects compliance with common standards and regulations such as GDPR or HIPAA.