Impact
The flaw resides in itsourcecode’s Society Management System 1.0 in the /admin/add_expenses.php script. An attacker can manipulate the ‘detail’ input parameter to inject arbitrary SQL statements. This remote SQL injection could allow unauthenticated read, modification, or deletion of database records, exposing sensitive information and compromising data integrity. The weakness is classified as CWE‑74 and CWE‑89.
Affected Systems
Itsourcecode Society Management System version 1.0 is the only affected release listed. No other product versions are currently identified as vulnerable.
Risk and Exploitability
The CVSS score of 6.9 indicates a high risk severity, while the EPSS score of less than 1% suggests a low current exploitation probability; the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it remotely by sending crafted requests to the ‘detail’ parameter over HTTP or HTTPS. Successful exploitation would grant the attacker unauthenticated database access, potentially leading to data theft or manipulation.
OpenCVE Enrichment