EUVD-2015-9407

| CVE-2015-20113 MEDIUM
2026-03-15 VulnCheck
5.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Mar 16, 2026 - 14:53 vuln.today
Public exploit code
EUVD ID Assigned
Mar 15, 2026 - 19:00 euvd
EUVD-2015-9407
Analysis Generated
Mar 15, 2026 - 19:00 vuln.today
CVE Published
Mar 15, 2026 - 18:34 nvd
MEDIUM 5.3

Description

Next Click Ventures RealtyScript 4.0.2 contains cross-site request forgery and persistent cross-site scripting vulnerabilities that allow attackers to perform administrative actions and inject malicious scripts. Attackers can craft malicious web pages that execute unauthorized actions when logged-in users visit them, or inject persistent scripts that execute in the application context.

Analysis

RealtyScript 4.0.2 by Next Click Ventures contains both cross-site request forgery (CSRF) and persistent cross-site scripting (XSS) vulnerabilities that allow unauthenticated attackers to perform unauthorized administrative actions and inject malicious scripts into the application. An attacker can craft malicious web pages that trick authenticated users into performing unintended administrative actions, or inject persistent scripts that execute in the application context for all users. With a CVSS score of 5.3 and a network-based attack vector requiring no privileges or user interaction beyond initial application access, this represents a moderate integrity risk to affected deployments.

Technical Context

The vulnerability chain exploits two distinct web application security flaws rooted in inadequate input validation and request authentication mechanisms. The CSRF vulnerability (CWE-352: Cross-Site Request Forgery) stems from the application's failure to implement proper anti-CSRF tokens or Same-Site cookie attributes, allowing attackers to forge requests that execute administrative functions when authenticated users visit malicious pages. The persistent XSS component indicates insufficient output encoding or sanitization of user-supplied input stored in the application database, causing malicious scripts to be reflected back to all users who access affected pages. RealtyScript 4.0.2 (CPE specification: cpe:2.3:a:next_click_ventures:realtyscript:4.0.2:*:*:*:*:*:*:*) appears to lack modern web security controls such as Content Security Policy (CSP) headers, CSRF token validation, and HTML entity encoding, making it vulnerable to both request forgery and script injection attacks.

Affected Products

Next Click Ventures RealtyScript version 4.0.2 is explicitly affected by both CSRF and persistent XSS vulnerabilities. The product is identified via CPE as cpe:2.3:a:next_click_ventures:realtyscript:4.0.2:*:*:*:*:*:*:*. While the CVE description does not specify whether versions prior to 4.0.2 are affected, versions at or below 4.0.2 should be considered vulnerable unless explicitly patched. Organizations running RealtyScript 4.0.2 in production environments managing real estate transactions, customer data, or administrative functions face direct exposure to request forgery and script injection attacks. No public vendor advisory URL has been identified in the provided intelligence; affected organizations should contact Next Click Ventures directly for patch availability and timeline information.

Remediation

The primary remediation is to upgrade RealtyScript to a patched version released by Next Click Ventures; organizations should contact the vendor immediately to confirm patch availability and version numbers for version 4.0.3 or later. If patching is not immediately available, implement the following interim controls: (1) Deploy a Web Application Firewall (WAF) configured to detect and block CSRF attacks (enforce token validation rules) and XSS payloads (HTMLEntity encoding filters); (2) Enforce HTTPS-only communication with HSTS (Strict-Transport-Security) headers to prevent man-in-the-middle exploitation; (3) Implement Content Security Policy (CSP) headers restricting script execution to trusted sources only, mitigating reflected and stored XSS; (4) Apply HTML entity encoding to all user-supplied input rendered in responses; (5) Restrict administrative access to trusted IP ranges via firewall rules to reduce CSRF attack surface; (6) Implement SameSite=Strict cookie attributes on session cookies to block CSRF vector; (7) Conduct a forensic audit of logs and user accounts for signs of prior exploitation. Contact Next Click Ventures support for guidance on patch testing and deployment timelines.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: +20

Share

EUVD-2015-9407 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy