Description
Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /classes/Master.php?f=delete_service.
Published: 2026-03-03
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

An injection flaw exists in the delete_service endpoint of the Simple Online Men's Salon Management System 1.0, allowing a malicious user to alter or execute arbitrary SQL commands against the underlying database. This can lead to unauthorized data disclosure, data modification, or deletion, compromising the confidentiality, integrity, and availability of the salon’s records. The vulnerability is a classic example of CWE‑89, where unsanitized input is incorporated directly into SQL statements.

Affected Systems

Area exploited is the REST‑like endpoint /classes/Master.php?f=delete_service of the Simple Online Men's Salon Management System developed by oretnom23. The affected version is 1.0; no other variants or vendor versions are listed.

Risk and Exploitability

The CVSS score is 2.7, reflecting a low severity assessment, and the EPSS indicates less than 1% likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, underscoring its lower exposure risk. Based on the nature and typical deployment of web applications, the attack vector is inferred to be remote via HTTP, but the description does not specify whether authentication, administrative privileges, or additional prerequisites are required for exploitation.

Generated by OpenCVE AI on April 16, 2026 at 14:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the system to a patched or newer version if one is released by oretnom23.
  • Refactor the delete_service code to use parameterized or prepared statements so that user-supplied values cannot alter SQL syntax.
  • Restrict access to the delete_service endpoint so that only authenticated, authorized personnel can invoke it, and enforce proper session handling.

Generated by OpenCVE AI on April 16, 2026 at 14:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title SQL Injection Vulnerability in Simple Online Men's Salon Management System 1.0

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Mens Salon Management System
Vendors & Products Sourcecodester
Sourcecodester online Mens Salon Management System

Wed, 04 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 simple Online Men\'s Salon Management System
CPEs cpe:2.3:a:oretnom23:simple_online_men\'s_salon_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 simple Online Men\'s Salon Management System

Tue, 03 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
Description Sourcecodester Simple Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /classes/Master.php?f=delete_service. Sourcecodester Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /classes/Master.php?f=delete_service.

Tue, 03 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description Sourcecodester Simple Online Men's Salon Management System v1.0 is vulnerable to SQL Injection in /classes/Master.php?f=delete_service.
References

Subscriptions

Oretnom23 Simple Online Men\'s Salon Management System
Sourcecodester Online Mens Salon Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-03T20:56:25.685Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26885

cve-icon Vulnrichment

Updated: 2026-03-03T20:53:53.409Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-03T17:16:18.573

Modified: 2026-03-04T14:04:47.307

Link: CVE-2026-26885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:15:28Z

Weaknesses