๐Ÿ” CVE Alert

CVE-2026-4169

LOW 2.4

Tecnick TCExam XML Export tce_xml_users.php F_xml_export_users cross site scripting

CVSS Score
2.4
EPSS Score
0.0%
EPSS Percentile
0th

A security flaw has been discovered in Tecnick TCExam up to 16.6.0. Affected is the function F_xml_export_users of the file admin/code/tce_xml_users.php of the component XML Export. Performing a manipulation results in cross site scripting. Remote exploitation of the attack is possible. There are still doubts about whether this vulnerability truly exists. Upgrading to version 16.6.1 is able to address this issue. The patch is named 899b5b2fa09edfe16043f07265e44fe2022b7f12. It is suggested to upgrade the affected component. When the vendor was informed about another security issue, he identified and fixed this flaw during analysis. He doubts the impact of this: "However, this is difficult to justify as security issue. It requires to be administrator to both create and consume the exploit. Administrators can do pretty much anything in the platform, so I don't see the point of this from a security perspective." This is reflected by the CVSS vector.

CWE CWE-79 CWE-94
Vendor tecnick
Product tcexam
Published Mar 15, 2026
Last Updated Mar 16, 2026
Stay Ahead of the Next One

Get instant alerts for tecnick tcexam

Be the first to know when new low vulnerabilities affecting tecnick tcexam are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Tecnick / TCExam
16.0 16.1 16.2 16.3 16.4 16.5 16.6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.351076 vuldb.com: https://vuldb.com/?ctiid.351076 github.com: https://github.com/tecnickcom/tcexam/commit/899b5b2fa09edfe16043f07265e44fe2022b7f12 github.com: https://github.com/tecnickcom/tcexam/releases/tag/16.6.1

Credits

VulDB