Description
Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/admin/appointments/view_appointment.php.
Published: 2026-03-03
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Assess Impact
AI Analysis

Impact

Sourcecodester Online Men's Salon Management System version 1.0 contains a SQL Injection flaw in the file /msms/admin/appointments/view_appointment.php. The vulnerability allows an attacker to insert malicious SQL code through unsanitized user input, potentially enabling the retrieval or alteration of database contents. The impact is limited to data confidentiality and integrity, as it does not directly compromise authentication or availability.

Affected Systems

The affected system is the Simple Online Men's Salon Management System, version 1.0, a web application used for managing appointments in a men’s salon. Vendor information is not specified in the Advisory. The vulnerability resides in the administrative module that renders appointment views.

Risk and Exploitability

The CVSS score is 2.7, indicating low severity, and the EPSS score is less than 1 %, suggesting a very low likelihood of exploitation. The vulnerability is not catalogued in CISA’s KEV list. Attackers would need to reach the vulnerable endpoint, which is likely part of the administrator interface, and supply a crafted parameter to exploit the injection. No public exploit or proof‑of‑concept code is referenced, and the low scoring metrics imply that the risk to typical deployments is modest but still warrants investigation.

Generated by OpenCVE AI on April 16, 2026 at 14:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the application to a version where the injection issue has been fixed, if an official patch is released.
  • If no patch is available, modify the code to use parameterized queries or prepared statements for all database interactions, especially in the view_appointment.php endpoint.
  • Sanitize and validate all user‑supplied data before passing it to SQL statements, ensuring that only expected data types and formats are accepted.

Generated by OpenCVE AI on April 16, 2026 at 14:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Mens Salon Management System
Vendors & Products Sourcecodester
Sourcecodester online Mens Salon Management System

Wed, 04 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 simple Online Men\'s Salon Management System
CPEs cpe:2.3:a:oretnom23:simple_online_men\'s_salon_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 simple Online Men\'s Salon Management System

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description Sourcecodester Simple Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/admin/appointments/view_appointment.php. Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/admin/appointments/view_appointment.php.

Tue, 03 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description Sourcecodester Simple Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /msms/admin/appointments/view_appointment.php.
References

Subscriptions

Oretnom23 Simple Online Men\'s Salon Management System
Sourcecodester Online Mens Salon Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-03T20:56:25.858Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26884

cve-icon Vulnrichment

Updated: 2026-03-03T20:53:55.595Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T17:16:18.457

Modified: 2026-03-04T14:04:40.010

Link: CVE-2026-26884

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:15:28Z

Weaknesses