Description
A flaw has been found in itsourcecode Society Management System 1.0. The affected element is an unknown function of the file /admin/delete_activity.php. Executing a manipulation of the argument activity_id can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used.
Published: 2026-01-18
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

This vulnerability allows an attacker to inject SQL code through the activity_id parameter in the delete_activity.php script of itsourcecode Society Management System 1.0. The injected payload can manipulate or read the database, potentially compromising the confidentiality and integrity of stored data. The flaw is an instance of input validation failure (CWE-74) and classic SQL injection (CWE-89).

Affected Systems

The affected product is itsourcecode: Society Management System, version 1.0, running on servers that expose the delete_activity.php endpoint to remote users. No other product versions have been reported as affected.

Risk and Exploitability

The CVSS score of 6.9 labels the exploit as moderate severity. The EPSS score of less than 1 % indicates a very low probability of current exploitation, and the vulnerability is not listed in CISA’s KEV catalog. Attackers can reach the vulnerable parameter remotely over HTTP or HTTPS. Once compromised, an attacker can manipulate query execution to modify, delete, or retrieve sensitive records, although the description does not specify authentication requirements. The overall risk remains moderate, but the potential impact on data integrity warrants precautionary action.

Generated by OpenCVE AI on April 18, 2026 at 05:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify all deployments of Society Management System 1.0 and install any vendor patch or upgrade to a fixed release when available.
  • Refactor delete_activity.php to use prepared statements or strictly typed, whitelisted values for activity_id, thereby enforcing strong input validation.
  • Deploy a web application firewall configured to block common SQL injection patterns targeting the activity_id parameter.
  • Configure detailed logging of database queries and review logs regularly for signs of abnormal activity.

Generated by OpenCVE AI on April 18, 2026 at 05:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Wed, 21 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sun, 18 Jan 2026 11:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Society Management System 1.0. The affected element is an unknown function of the file /admin/delete_activity.php. Executing a manipulation of the argument activity_id can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used.
Title itsourcecode Society Management System delete_activity.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:38:04.747Z

Reserved: 2026-01-17T18:10:59.578Z

Link: CVE-2026-1119

cve-icon Vulnrichment

Updated: 2026-01-21T16:28:55.750Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T12:15:48.270

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses