Cyber Posture

CVE-2015-20118

HighPublic PoC

Published: 16 March 2026

Published
16 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
EPSS Score 0.0004 11.5th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2015-20118 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Nextclickventures Realtyscript. Its CVSS base score is 7.2 (High).

Operationally, ranked at the 11.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-79

Penetration testing submits XSS payloads to web applications, detecting cross-site scripting flaws for subsequent remediation.

addresses: CWE-79

Validates web inputs to reject script-related content that could produce XSS.

addresses: CWE-79

Output validation against expected content can reject or sanitize script content in generated web pages, reducing XSS exploitability.

NVD Description

Next Click Ventures RealtyScript 4.0.2 contains a stored cross-site scripting vulnerability in the location_name parameter of the admin locations interface. Attackers can submit POST requests to the locations.php endpoint with JavaScript payloads in the location_name field to execute arbitrary code…

more

in administrator browsers.

Deeper analysisAI

Next Click Ventures RealtyScript 4.0.2 is affected by CVE-2015-20118, a stored cross-site scripting (XSS) vulnerability identified under CWE-79. The flaw resides in the location_name parameter within the admin locations interface, specifically at the locations.php endpoint. Attackers can inject JavaScript payloads via POST requests, which are stored and later rendered without proper sanitization, leading to arbitrary code execution in the browsers of authenticated administrators. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N), indicating high severity due to its network accessibility, low attack complexity, and lack of prerequisites.

Unauthenticated attackers (PR:N) can exploit this vulnerability remotely by submitting malicious POST requests to locations.php with JavaScript in the location_name field. Once stored, the payload executes when administrators access the locations interface, potentially allowing theft of admin session cookies, keystroke logging, or redirection to phishing sites. The changed scope (S:C) reflects the impact crossing into the admin user's browser context, enabling limited confidentiality and integrity violations without availability disruption.

Advisories from referenced sources, including Exploit-DB (exploit 38496), VulnCheck, and Zero Science Labs (ZSL-2015-5269), document the vulnerability and provide proof-of-concept exploits demonstrating the stored XSS via the location_name parameter. No specific patches or mitigation steps are detailed in the provided descriptions, though upgrading to a non-vulnerable version of RealtyScript or implementing input sanitization on the backend is implied as standard remediation for XSS flaws.

A public exploit is available on Exploit-DB, indicating potential for real-world abuse against unpatched RealtyScript 4.0.2 deployments, particularly in real estate management environments. The CVE was published on 2026-03-16 despite the 2015-era vulnerability disclosure.

Details

CWE(s)

Affected Products

nextclickventures
realtyscript
4.0.2

CVEs Like This One

CVE-2015-20115Same product: Nextclickventures Realtyscript
CVE-2015-20120Same product: Nextclickventures Realtyscript
CVE-2015-20117Same product: Nextclickventures Realtyscript
CVE-2015-20121Same product: Nextclickventures Realtyscript
CVE-2026-2101Shared CWE-79
CVE-2025-0817Shared CWE-79
CVE-2025-22751Shared CWE-79
CVE-2024-26006Shared CWE-79
CVE-2025-7760Shared CWE-79
CVE-2026-30862Shared CWE-79

References