Description
A vulnerability was found in itsourcecode Society Management System 1.0. The affected element is an unknown function of the file /admin/edit_activity.php. Performing a manipulation of the argument activity_id results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection that can expose or modify database content
Action: Patch Now
AI Analysis

Impact

An unknown function in the admin/edit_activity.php script accepts an activity_id parameter that is not properly sanitized. By manipulating this argument, an attacker can inject arbitrary SQL statements, allowing unauthorized reading, modification, or deletion of database records. The flaw directly compromises data confidentiality and integrity.

Affected Systems

The vulnerability affects itsourcecode Society Management System version 1.0, as identified by the vendor itsourcecode in the product name. The affected code resides in the admin component and is accessible at /admin/edit_activity.php. No other versions are explicitly listed as vulnerable.

Risk and Exploitability

With a CVSS score of 6.9 the flaw sits in the medium severity range, while the EPSS score of less than 1 % indicates a low probability of exploitation at present. Nonetheless, the vulnerability is exploitable remotely and a public exploit is available. The flaw is not currently listed in the CISA KEV catalog, but the existence of a publicly known exploit warrants a timely response.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a version of Society Management System that resolves the SQL injection in edit_activity.php.
  • Implement strict input validation for activity_id, ensuring it is an integer, and use parameterized queries or prepared statements to eliminate direct query concatenation.
  • Restrict access to /admin/edit_activity.php to authenticated administrative users only, employing role‑based access control or IP whitelisting where possible.
  • Deploy a Web Application Firewall configured to detect and block SQL injection patterns targeting this endpoint.

Generated by OpenCVE AI on April 17, 2026 at 22:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Sun, 08 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in itsourcecode Society Management System 1.0. The affected element is an unknown function of the file /admin/edit_activity.php. Performing a manipulation of the argument activity_id results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Title itsourcecode Society Management System edit_activity.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:35:47.503Z

Reserved: 2026-02-06T14:41:38.953Z

Link: CVE-2026-2117

cve-icon Vulnrichment

Updated: 2026-02-10T19:23:14.867Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T00:16:02.850

Modified: 2026-02-10T13:53:56.387

Link: CVE-2026-2117

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses