Home

Description

ATutor is vulnerable to Reflected XSS in /install/install.php endpoint. An attacker can provide a specially crafted URL that, when opened, results in arbitrary JavaScript execution in the victim's browser. Product is no longer actively supported. Maintainers of this project were notified early about this vulnerability, but did not respond with the details of the vulnerability or vulnerable version range. Only version 2.2.4 was tested and confirmed as vulnerable, other versions were not tested but might also be vulnerable.

PUBLISHED Reserved 2026-04-24 | Published 2026-05-11 | Updated 2026-05-11 | Assigner CERT-PL




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

2.2.4 (semver)
affected

Credits

Michał Majchrowicz (AFINE) finder

Marcin Wyczechowski (AFINE) finder

Pawel Zdunek (AFINE) finder

References

cert.pl/en/posts/2026/05/CVE-2026-6909 third-party-advisory

atutor.github.io/ product

cve.org (CVE-2026-6956)

nvd.nist.gov (CVE-2026-6956)

Download JSON