Description
A vulnerability was detected in itsourcecode Society Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_admin.php. The manipulation of the argument admin_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the edit_admin.php script of Society Management System 1.0, where the admin_id parameter is insufficiently sanitized, allowing an attacker to inject arbitrary SQL through a GET or POST request. This flaw can lead to data tampering, disclosure, or potential privilege escalation if the database user has elevated rights. The weakness is a classic injection flaw classified as CWE-74 and CWE-89. The vulnerability is exploitable without authentication and can be executed over a network to compromise the integrity and confidentiality of the system’s data.

Affected Systems

The affected software is Society Management System version 1.0, produced by itsourcecode. No additional versions are listed as affected, and the vulnerability description states that the issue exists in unknown code of the file /admin/edit_admin.php. The CPE indicates the product name as society_management_system with version 1.0.

Risk and Exploitability

The CVSS score of 6.9 places the flaw in the medium severity range, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, suggesting that it has not been widely observed in attacks yet. Nevertheless, because the attack can be performed from the public internet via the admin_id argument, an adversary can trigger the injection by sending a crafted request to the edit_admin.php endpoint. The lack of authentication requirements and the publicly disclosed exploit code increase the risk that the flaw could be leveraged by threat actors.

Generated by OpenCVE AI on April 18, 2026 at 13:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If a vendor patch or newer version is available, upgrade to the patched release; there is no official patch listed, so apply the fix as soon as it is released.
  • Apply input validation on the admin_id parameter and use parameterized SQL queries to eliminate the injection vector.
  • Restrict access to the /admin directory to only authenticated administrators, and consider enabling IP whitelisting or VPN access to limit exposure.

Generated by OpenCVE AI on April 18, 2026 at 13:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sat, 07 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode Society Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_admin.php. The manipulation of the argument admin_id results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Title itsourcecode Society Management System edit_admin.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:35:06.346Z

Reserved: 2026-02-06T14:40:49.674Z

Link: CVE-2026-2114

cve-icon Vulnrichment

Updated: 2026-02-10T19:19:31.487Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T22:16:03.070

Modified: 2026-02-10T13:22:18.570

Link: CVE-2026-2114

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:30:45Z

Weaknesses