Description
A vulnerability was detected in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_student_query.php. The manipulation of the argument student_id results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
Published: 2026-01-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The only untrusted input, student_id, is embedded directly into SQL statements without sanitisation or parameterisation, allowing an attacker who supplies crafted input to inject arbitrary SQL. The injected SQL can read, modify or delete database records, potentially exfiltrating sensitive student information or corrupting the database. The vulnerability exists in the admin interface of the Society Management System and can be exercised remotely over the web network.

Affected Systems

The vulnerability affects the itsourcecode Society Management System version 1.0, specifically the /admin/edit_student_query.php file. No other vendors or product versions are listed.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity. The EPSS score is below 1 %, showing that the real‑world exploitation probability is very low at the time of analysis. The vulnerability is not in the CISA KEV catalog, so no large‑scale known exploitation campaigns are currently reported. Nevertheless, the attack can be performed from any remote host that has network connectivity to the web server, making it an easily reachable risk once the fix has not been applied.

Generated by OpenCVE AI on April 18, 2026 at 14:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest version of the Society Management System that contains the fix for CVE‑2026‑1595.
  • If an update is unavailable, sanitize or whitelist the student_id input and use parameterised queries to prevent SQL injection.
  • Restrict access to the /admin/edit_student_query.php endpoint to authorised personnel only, enforcing strong authentication and IP whitelisting.
  • Limit the database user to the minimum permissions required by the application.

Generated by OpenCVE AI on April 18, 2026 at 14:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Feb 2026 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode Society Management System 1.0. This affects an unknown part of the file /admin/edit_student_query.php. The manipulation of the argument student_id results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
Title itsourcecode Society Management System edit_student_query.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:05:13.258Z

Reserved: 2026-01-29T08:32:45.204Z

Link: CVE-2026-1595

cve-icon Vulnrichment

Updated: 2026-01-29T21:30:29.419Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T16:16:14.807

Modified: 2026-02-02T20:52:57.747

Link: CVE-2026-1595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses