Description
A vulnerability has been found in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/edit_expenses.php. Such manipulation of the argument expenses_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to potential database compromise
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the admin/edit_expenses.php page of itsourcecode Society Management System 1.0. Manipulating the expenses_id argument triggers a SQL injection that can be performed remotely without authentication. The attack can allow an attacker to execute arbitrary SQL statements against the underlying database, potentially compromising confidentiality, integrity, or availability of the stored data. The weakness is categorized as a CWE-74 and CWE-89 type injection flaw.

Affected Systems

Affected systems include Society Management System 1.0 published by itsourcecode. The only version explicitly mentioned is 1.0. No newer versions are listed in the provided references. The CPE string cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:* narrows the scope to that specific release, indicating that earlier or later versions are not known to be vulnerable without further evidence.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS value of less than 1% suggests a low likelihood of exploitation at any given point. The vulnerability is not listed in CISA's KEV catalog, implying no documented active exploits. The attack vector is inferred to be remote since the exploit is triggered by manipulating a web request to the affected file, and any authenticated or unauthenticated user who can reach the URL could potentially exploit it if the application fails to validate or parameterize the input.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor's website or support portal for an updated version or patch that addresses the SQL injection and apply it immediately.
  • Configure web server or firewall rules to restrict public access to /admin/edit_expenses.php, allowing only authenticated administrative users to reach the page.
  • Validate the expenses_id input to ensure it is strictly numeric before using it in database queries; if possible, replace dynamic SQL with parameterized prepared statements.
  • Ensure the database account used by the application has the least privileges necessary, limiting the potential impact of an injection attack.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sat, 07 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in itsourcecode Society Management System 1.0. Impacted is an unknown function of the file /admin/edit_expenses.php. Such manipulation of the argument expenses_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title itsourcecode Society Management System edit_expenses.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:35:34.019Z

Reserved: 2026-02-06T14:41:00.785Z

Link: CVE-2026-2116

cve-icon Vulnrichment

Updated: 2026-02-10T19:22:03.767Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T00:16:02.277

Modified: 2026-02-10T13:53:15.400

Link: CVE-2026-2116

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses