Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-4991 β€” AI Deep Analysis Summary

CVSS 3.5 Β· Low

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Cross-Site Scripting (XSS) vulnerability in the QDOCS Admission Query module. πŸ’₯ **Consequence**: Attackers can inject malicious scripts to steal user cookies or session information.

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: The frontend fails to effectively filter input parameters for the "Admission Query". ⚠️ **Vulnerability Point**: User-controllable data is directly rendered on the page, triggering the browser to execut…

Q3Who is affected? (Versions/Components)

🏫 **Affected Component**: QDOCS Smart School Management System. πŸ“‰ **Version Range**: Version 7.2 is explicitly mentioned as containing this vulnerability.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈβ€β™‚οΈ **Attacker Privileges**: Requires low privileges (PR:L), typically requiring login. πŸ“‚ **Data Theft**: Can obtain sensitive information of the currently logged-in user or perform phishing operations.

Q5Is exploitation threshold high? (Auth/Config)

πŸšͺ **Exploitation Threshold**: Medium. πŸ”‘ **Prerequisites**: The attacker must induce the victim (UI:R) to click a malicious link, and the target must possess login privileges.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ› οΈ **Existing Tools**: No public PoC code available (pocs list is empty). 🌐 **In-the-Wild Status**: Third-party security reports have been submitted; vigilance against potential exploitation is required.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check Method**: Focus on scanning the entry point of the "Admission Query" function. πŸ§ͺ **Test Characteristics**: Inject `<script>` tags into query parameters and observe if they are reflected and executed.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Official Status**: Data does not explicitly provide an official patch link. πŸ“ **Recommendation**: Monitor official QDOCS announcements and wait for the release of security updates.

Q9What if no patch? (Workaround)

🚧 **Temporary Mitigation**: Deploy WAF rules to intercept XSS signatures. πŸ”’ **Access Control**: Restrict the IP range for accessing the "Admission Query" page or add two-factor authentication.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: Medium to High Risk (CVSS 3.1). πŸ“… **Priority**: Recommended to investigate as soon as possible, with special protection required during the school admission season.