leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221799.","vulnerabilityLevel":"MEDIUM","cvssScore":6.1,"affectedProduct":{"@type":"Product","name":"simple responsive tourism website","manufacturer":{"@type":"Organization","name":"oretnom23"}}},"keywords":"CVE-2023-1041, medium, security vulnerability, CVE, oretnom23, simple responsive tourism website, exploit available, cybersecurity, threat intelligence","aggregateRating":{"@type":"AggregateRating","ratingValue":6.1,"bestRating":10,"worstRating":0,"ratingCount":1}}

CVE-2023-1041

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious scripts into the website, which could lead to unauthorized actions or data theft from users who visit the affected page. It can be exploited remotely by manipulating a specific input field without needing any special access or credentials.

Technical Description

A vulnerability, which was classified as problematic, was found in SourceCodester Simple Responsive Tourism Website 1.0. This affects an unknown part of the file /tourism/rate_review.php. The manipulation of the argument id with the input 1"><script>alert(1111)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221799.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$862($500-$1K)
Vendor Response
Grade FPatched in 1088 days

Quick Information

Published

Feb 26, 2023

about 3 years ago

Last Modified

Feb 18, 2026

about 2 months ago

Vendor

oretnom23

Product

simple responsive tourism website

Related Vulnerabilities

CVE-2026-3752Medium

This vulnerability allows an attacker to remotely manipulate the date parameter in the daily task report feature of the employee task management system, potentially leading to unauthorized access to the database. To exploit this flaw, the attacker simply needs to send a specially crafted request to the affected system.

CVE-2026-3751Medium

This vulnerability allows an attacker to execute malicious SQL commands on the employee task management system, potentially accessing or manipulating sensitive data. It can be exploited remotely by sending specially crafted requests to a specific part of the application without needing any special access or credentials.

CVE-2026-3746Medium

An attacker can exploit a vulnerability in the login feature of a tourism website to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This can be done remotely by manipulating the username input, and the exploit is publicly known, making it easier for attackers to take advantage of it.

CVE-2026-26886Low

This vulnerability allows an attacker to manipulate the database of the online men's salon management system by injecting malicious SQL code through the admin service management page. To exploit this, the attacker needs access to the admin panel, which may require valid login credentials.

CVE-2026-26885Low

This vulnerability allows an attacker to manipulate the database of a men's salon management system by injecting harmful SQL commands through a specific URL. To exploit it, the attacker needs to access the system's delete service function, which could lead to unauthorized data deletion or exposure.