Description
A flaw has been found in itsourcecode Society Management System 1.0. This issue affects some unknown processing of the file /admin/delete_expenses.php. This manipulation of the argument expenses_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an insecure handling of the expenses_id parameter in the delete_expenses.php script of itsourcecode's Society Management System. Attackers can craft a request that injects arbitrary SQL commands into the database query. This flaw does not require local or privileged access; the attack can be launched remotely from any machine that can reach the web application. The ability to execute arbitrary SQL statements can lead to unauthorized data exposure, tampering, or deletion of financial records kept by the system.

Affected Systems

The exploit targets the Society Management System version 1.0 developed by itsourcecode. The vulnerability exists in the delete_expenses.php endpoint, which is accessible to any user who can send requests to the application. No other products or versions are listed as affected at this time.

Risk and Exploitability

The vulnerability has a CVSS score of 6.9 and an EPSS score of less than 1%, indicating low prevalence but a possible exploit discovery. It is not listed in CISA’s KEV catalog, but the exploit has been published and can be used remotely. Attackers can leverage the flaw by sending a crafted expenses_id value through GET or POST, triggering an injection that may reveal or alter sensitive expense data. The impact encompasses unauthorized data access and potential manipulation of the system’s financial records.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest version of Society Management System that contains a fix for delete_expenses.php.
  • Restrict access to delete_expenses.php to authenticated administrative users and validate the expenses_id parameter before use.
  • Establish a web application firewall rule to detect and block common SQL injection patterns on the expenses_id argument.
  • Refactor the application code to use prepared statements or parameterized queries so that expenses_id is never concatenated into raw SQL statements.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sat, 07 Feb 2026 22:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Society Management System 1.0. This issue affects some unknown processing of the file /admin/delete_expenses.php. This manipulation of the argument expenses_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title itsourcecode Society Management System delete_expenses.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:35:20.689Z

Reserved: 2026-02-06T14:40:57.356Z

Link: CVE-2026-2115

cve-icon Vulnrichment

Updated: 2026-02-10T19:20:46.606Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T23:15:48.663

Modified: 2026-02-10T13:23:11.467

Link: CVE-2026-2115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses