Description
A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-01-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the /admin/edit_expenses_query.php script allows an attacker to supply a crafted detail argument that is directly inserted into a database query. This omission of input sanitization or parameterized queries permits remote SQL injection. Based on the description, the injection could be used to read from, modify, or delete data stored in the database, potentially exposing sensitive information or compromising system integrity. This statement is inferred from the nature of SQL injection rather than explicitly stated in the advisory.

Affected Systems

The affected product is Society Management System 1.0 from itsourcecode, as listed by the CNA. No other versions are mentioned as vulnerable. Systems running this version and exposing the /admin/edit_expenses_query.php endpoint are at risk.

Risk and Exploitability

The CVSS score of 6.9 places the vulnerability in the medium severity range. EPSS indicates a very low exploitation probability (<1%), suggesting that in the wild the attack rate may be low. However, the advisory notes that an exploit has been publicly released, which raises operational relevance. The flaw is not yet cataloged in the CISA KEV list. Because the attack can be launched remotely and the injection payload fully controls the SQL query, the potential impact remains significant should an attacker succeed.

Generated by OpenCVE AI on April 18, 2026 at 18:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor‑released patch or upgrade to a non‑vulnerable version of Society Management System.
  • Rewrite the edit_expenses_query.php code to use parameterized SQL queries and validate the detail input against expected formats before executing database operations.
  • Limit the privileges of the database account used by the web application to the minimal set required for its normal operation.

Generated by OpenCVE AI on April 18, 2026 at 18:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Thu, 29 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title itsourcecode Society Management System edit_expenses_query.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:04:46.191Z

Reserved: 2026-01-29T08:32:36.564Z

Link: CVE-2026-1593

cve-icon Vulnrichment

Updated: 2026-01-29T15:54:17.362Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T15:16:13.797

Modified: 2026-02-02T20:54:26.120

Link: CVE-2026-1593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:45:05Z

Weaknesses