Description
A vulnerability was identified in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_activity_query.php. The manipulation of the argument Title leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-01-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access and modification
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides within an undisclosed portion of /admin/edit_activity_query.php. By manipulating the Title parameter, an attacker can inject arbitrary SQL statements, a classic injection flaw classified under CWE‑74 and CWE‑89. While the vulnerability does not provide direct code‑execution capability, it enables unauthorized reading, alteration, or deletion of database contents, potentially exposing sensitive organizational data.

Affected Systems

The flaw affects itsourcecode Society Management System version 1.0. No other product or version instances are listed.

Risk and Exploitability

The CVSS score of 5.3 denotes a medium severity, and the EPSS score of less than 1 % indicates a low probability of observed exploitation. It is not listed in the CISA KEV catalog, suggesting it is not yet a high‑profile or actively exploited vulnerability. The attack vector is remote, exploiting the Title input field, and the exploit code is publicly available, making the risk real for unpatched installations.

Generated by OpenCVE AI on April 18, 2026 at 19:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade or apply the vendor‑supplied patch that fixes the injection flaw in Society Management System 1.0.
  • Replace the application’s Title parameter handling with parameterized queries or stored procedures to eliminate unsanitized user input.
  • Restrict the database user used by the web application to the minimum privileges required for its functions, limiting the damage that can be done if injection succeeds.
  • Deploy a web application firewall rule set to detect and block typical SQL injection patterns targeting the Title field.

Generated by OpenCVE AI on April 18, 2026 at 19:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_activity_query.php. The manipulation of the argument Title leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
Title itsourcecode Society Management System edit_activity_query.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:13:39.949Z

Reserved: 2026-01-04T06:56:27.044Z

Link: CVE-2026-0582

cve-icon Vulnrichment

Updated: 2026-01-05T21:14:18.183Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T09:15:55.087

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:30:08Z

Weaknesses