Description
A vulnerability has been found in SourceCodester Prison Management System 1.0. The impacted element is an unknown function of the component Login. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Session Hijack
Action: Apply Patch
AI Analysis

Impact

A flaw in the login component of SourceCodester Prison Management System 1.0 permits an attacker to set a user’s session identifier before authentication. Once the user logs in, the application accepts the pre‑set identifier, allowing the attacker to impersonate the account. This session fixation can lead to unauthorized access to restricted data and actions within the system.

Affected Systems

The vulnerability affects only SourceCodester Prison Management System version 1.0, as identified by the vendor and the component name in the description. No other products or versions are listed as impacted.

Risk and Exploitability

The CVSS base score of 6.9 indicates a moderate severity. The exploit probability is reported as less than 1 % by EPSS, and the vulnerability is not included in the CISA Known Exploited Vulnerabilities catalog. Attackers can target the login page from a remote location and do not need special permissions beyond the ability to submit a request. While exploitation is considered low probability, the potential for unauthorized access warrants prompt attention.

Generated by OpenCVE AI on April 17, 2026 at 21:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or official fix for Prison Management System 1.0 that removes the session fixation vulnerability.
  • If no immediate patch is available, implement a temporary workaround by regenerating the session identifier immediately after successful authentication and setting secure cookie attributes such as HttpOnly and Secure.
  • Continuously monitor authentication logs for evidence of repeated or suspicious login attempts that may indicate session hijacking attempts.

Generated by OpenCVE AI on April 17, 2026 at 21:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Fast5
Fast5 prison Management System
CPEs cpe:2.3:a:fast5:prison_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fast5
Fast5 prison Management System

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester prison Management System
Vendors & Products Sourcecodester
Sourcecodester prison Management System

Sun, 08 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Prison Management System 1.0. The impacted element is an unknown function of the component Login. The manipulation leads to session fixiation. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title SourceCodester Prison Management System Login session fixiation
Weaknesses CWE-384
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Fast5 Prison Management System
Sourcecodester Prison Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:47:29.826Z

Reserved: 2026-02-07T15:09:26.244Z

Link: CVE-2026-2177

cve-icon Vulnrichment

Updated: 2026-02-09T17:41:56.193Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T19:16:22.130

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:00:11Z

Weaknesses