Home

Description

A vulnerability was detected in PHPEMS 11.0. The affected element is an unknown function of the file /index.php?ask=app-ask. Performing a manipulation of the argument askcontent results in cross site scripting. The attack is possible to be carried out remotely. The exploit is now public and may be used.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Cross Site Scripting

Code Injection

Timeline

2026-03-11:Advisory disclosed
2026-03-11:VulDB entry created
2026-03-11:VulDB entry last update

Credits

shufenshui (VulDB User) reporter

References

vuldb.com/?id.350368 (VDB-350368 | PHPEMS index.php cross site scripting) vdb-entry technical-description

vuldb.com/?ctiid.350368 (VDB-350368 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.773039 (Submit #773039 | PHPEMS V11.0 Stored Cross-Site Scripting) third-party-advisory

github.com/shufenshui/CVE/issues/1 issue-tracking

github.com/user-attachments/files/25814874/default.docx exploit

cve.org (CVE-2026-3946)

nvd.nist.gov (CVE-2026-3946)

Download JSON