CVE-2015-20118

| EUVD-2015-9417 HIGH
2026-03-15 VulnCheck
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
EUVD ID Assigned
Mar 15, 2026 - 20:00 euvd
EUVD-2015-9417
Analysis Generated
Mar 15, 2026 - 20:00 vuln.today
CVE Published
Mar 15, 2026 - 18:34 nvd
HIGH 7.2

Description

Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers.

Analysis

A stored cross-site scripting (XSS) vulnerability exists in RealtyScript 4.0.2's admin locations interface, allowing unauthenticated attackers to inject malicious JavaScript through the location_name parameter. Successful exploitation enables arbitrary code execution in administrator browsers when they view compromised location entries. A public proof-of-concept exploit is available on Exploit-DB, though no active exploitation has been reported (not in CISA KEV).

Technical Context

RealtyScript (CPE: cpe:2.3:a:next_click_ventures:realtyscript:*:*:*:*:*:*:*:*) is a PHP-based real estate listing management system. The vulnerability stems from insufficient input validation in the locations.php endpoint, which fails to properly sanitize user-supplied data in the location_name field before storing it in the database. This is a classic example of CWE-79 (Improper Neutralization of Input During Web Page Generation), where untrusted data is included in web page output without proper validation or escaping.

Affected Products

Next Click Ventures RealtyScript version 4.0.2 is confirmed vulnerable. The CPE string suggests all versions may be affected (wildcard notation), though only 4.0.2 is explicitly confirmed in the EUVD database. The vulnerability specifically affects the admin locations management interface accessible via locations.php.

Remediation

No official patch information is available in the provided references. Immediate mitigations include: 1) Implement input validation and output encoding for the location_name parameter in locations.php, 2) Deploy a Web Application Firewall (WAF) to filter XSS payloads, 3) Restrict access to the admin interface through IP whitelisting, 4) Regular security audits of admin-accessible forms. Organizations should contact Next Click Ventures for patch availability or consider migrating to a maintained real estate management solution.

Priority Score

56
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Share

CVE-2015-20118 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy