Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Next Click Ventures
Next Click Ventures realtyscript |
|
| Vendors & Products |
Next Click Ventures
Next Click Ventures realtyscript |
Sun, 15 Mar 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code in administrator browsers. | |
| Title | RealtyScript 4.0.2 Stored Cross-Site Scripting via location_name Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-16T14:30:30.949Z
Reserved: 2026-03-15T18:06:31.579Z
Link: CVE-2015-20118
No data.
Status : Received
Published: 2026-03-16T14:17:47.450
Modified: 2026-03-16T14:17:47.450
Link: CVE-2015-20118
No data.
OpenCVE Enrichment
Updated: 2026-03-16T09:21:15Z
Weaknesses