Input passed via the "name" parameter to manage_proj_cat_add.php when creating a project category is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed. Successful exploitation requires "manager" permissions.