Description
A vulnerability was detected in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-01-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection allowing unauthorized data access and modification
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Title parameter of /admin/add_activity.php in Society Management System 1.0 permits an attacker to inject arbitrary SQL statements. This vulnerability can be leveraged remotely and can lead to reading, altering, or deleting database contents, thereby compromising the confidentiality, integrity, and availability of the system’s data.

Affected Systems

The vulnerability affects itsourcecode’s Society Management System version 1.0. No other product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity vulnerability. The EPSS score of less than 1 percent suggests a low current exploitation likelihood, but the public nature of the exploit and remote attack vector mean that an attacker could still gain significant access if the system is not patched. The vulnerability is not listed in the CISA KEV catalog, but organizations using the affected version should treat it as a security concern and apply mitigations as soon as possible.

Generated by OpenCVE AI on April 18, 2026 at 05:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Society Management System to the latest patch that includes protection for the add_activity.php file.
  • If an update is unavailable, modify add_activity.php to use prepared statements or properly escape the Title input to eliminate SQL injection risk.
  • Restrict access to /admin/add_activity.php by requiring authentication and limiting its exposure to trusted administrative users only.

Generated by OpenCVE AI on April 18, 2026 at 05:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Wed, 21 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sun, 18 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title itsourcecode Society Management System add_activity.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:37:51.953Z

Reserved: 2026-01-17T18:10:53.074Z

Link: CVE-2026-1118

cve-icon Vulnrichment

Updated: 2026-01-21T16:29:37.881Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T11:15:48.860

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1118

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses