Description
A vulnerability was found in itsourcecode Event Management System 1.0. The impacted element is an unknown function of the file /admin/manage_user.php. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to unauthorized data access or modification
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in an undisclosed function within /admin/manage_user.php of Event Management System 1.0. When an attacker manipulates the ID argument, the application constructs an SQL query without proper sanitisation, enabling the injection of arbitrary SQL code. This can allow the attacker to read, modify, or delete data in the database, potentially exposing sensitive user information or corrupting the system state.

Affected Systems

itsourcecode Event Management System 1.0 is affected. The vulnerability is specific to version 1.0, as identified by the vendor and its corresponding CPE.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate severity. EPSS indicates less than 1 percent probability of exploitation at present, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless the exploit has been made public, and the attack vector appears to be remote via the ID parameter in a URL or form submission. An attacker who successfully injects SQL can potentially gain full read/write access to the database and compromise confidentiality, integrity, and availability of the system.

Generated by OpenCVE AI on April 18, 2026 at 13:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and deploy the vendor’s patch or an updated version of Event Management System that resolves the SQL injection in manage_user.php
  • Modify the application code to validate the ID input and use parameterised queries or prepared statements to eliminate unsanitised SQL construction
  • Reduce the privileges of the database user that the application uses, ensuring it has only the minimal rights required to perform its functions

Generated by OpenCVE AI on April 18, 2026 at 13:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc event Management System
CPEs cpe:2.3:a:admerc:event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc event Management System

Mon, 09 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode event Management System
Vendors & Products Itsourcecode
Itsourcecode event Management System

Mon, 09 Feb 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in itsourcecode Event Management System 1.0. The impacted element is an unknown function of the file /admin/manage_user.php. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Title itsourcecode Event Management System manage_user.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Event Management System
Itsourcecode Event Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:57:24.618Z

Reserved: 2026-02-08T14:34:45.349Z

Link: CVE-2026-2217

cve-icon Vulnrichment

Updated: 2026-02-09T16:09:07.623Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T06:16:24.817

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses