CVE-2026-7095
Received Received - Intake
Cross-Site Scripting in Employee Management System edit.php

Publication date: 2026-04-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was identified in code-projects Employee Management System 1.0. This affects an unknown part of the file 370project/edit.php. The manipulation of the argument ID leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects employee_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The CVE-2026-7095 vulnerability is a Reflected Cross-Site Scripting (XSS) issue found in the file 370project/edit.php of the Employee Management System 1.0. It occurs when an attacker manipulates the argument ID to inject arbitrary JavaScript code into a link. When an administrator clicks this malicious link, the injected script executes in their browser.


How can this vulnerability impact me? :

This vulnerability can have several severe impacts including session hijacking by stealing cookies or tokens, account takeover allowing attackers to perform sensitive actions with administrative privileges, and page defacement or phishing through fake login prompts or tampering with displayed data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability exists in the file `370project/edit.php` of the Employee Management System and is a Reflected Cross-Site Scripting (XSS) issue. Detection can involve testing the input parameter ID for improper sanitization by injecting typical XSS payloads such as `"><ScRiPt>alert(1)</ScRiPt>` and observing if the script executes.

To detect this on your system, you can use web application testing tools or manual curl commands to send crafted requests and check the response for reflected scripts.

  • Example curl command to test the vulnerability: curl -i "http://yourserver/370project/edit.php?ID=\"><ScRiPt>alert(1)</ScRiPt>"
  • Use browser developer tools or intercepting proxies (e.g., Burp Suite) to analyze the response for reflected script execution.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing and validating all user inputs, especially the ID parameter in the `370project/edit.php` file, to prevent injection of malicious scripts.

Implement output encoding to ensure that any data reflected back to the browser is treated as text rather than executable code.

Restrict access to the vulnerable page to trusted users only and consider applying web application firewall (WAF) rules to block common XSS payloads.

If possible, update or patch the Employee Management System to a version where this vulnerability is fixed.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a reflected Cross-Site Scripting (XSS) issue that can lead to session hijacking, account takeover, and phishing attacks. Such security weaknesses can result in unauthorized access to sensitive information or administrative functions.

While the provided information does not explicitly mention compliance with standards like GDPR or HIPAA, the potential for unauthorized access and data manipulation caused by this vulnerability could lead to violations of these regulations, which require protection of personal and sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart