Home

Description

Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious HTML and iframe elements through the text parameter in the pages.php admin interface. Attackers can submit POST requests to the add page action with crafted iframe payloads in the text parameter to store malicious content that executes in the browsers of users viewing the affected pages.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

4.0.2
affected

References

www.exploit-db.com/exploits/38496 (ExploitDB-38496) exploit

www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5269.php (Zero Science Lab Disclosure) third-party-advisory

www.vulncheck.com/...ripting-via-text-parameter-in-pages-php (VulnCheck Advisory: RealtyScript 4.0.2 Stored Cross-Site Scripting via text Parameter in pages.php) third-party-advisory

cve.org (CVE-2015-20119)

nvd.nist.gov (CVE-2015-20119)

Download JSON