Description
A vulnerability was detected in itsourcecode Event Management System 1.0. Affected is an unknown function of the file /admin/manage_booking.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Published: 2026-02-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection via ID in Event Management System
Action: Immediate Patch
AI Analysis

Impact

A manipulation of the ID argument within /admin/manage_booking.php allows execution of arbitrary SQL statements leading to potential data exfiltration or modification. The flaw can compromise both confidentiality and integrity by exposing sensitive event and booking information or altering database contents. Because the injection occurs at the database layer, the damage can extend to any data stored by the application.

Affected Systems

The vulnerability exists in itsourcecode Event Management System version 1.0, specifically within the manage_booking.php file. The affected function is not publicly named, but the ID parameter is the entry point for exploitation.

Risk and Exploitability

The condition has a CVSS score of 6.9, indicating moderate severity. The EPSS score is less than 1%, suggesting exploitation probability is currently low, but the exploit is publicly available and can be launched from any remote source that can reach the web interface. It is not listed in the CISA KEV catalog, yet the public availability of the exploit emphasizes the need for immediate remediation. The attack vector is inferred to be network‑based, requiring access to the management interface over HTTP/HTTPS.

Generated by OpenCVE AI on April 18, 2026 at 17:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch or upgrade to a newer release of the Event Management System that resolves the ID injection flaw.
  • Restrict access to /admin/manage_booking.php so that only authenticated administrators can execute the script, using web‑server authentication or application‑level role checks.
  • Modify the application code to use prepared statements or bound parameters for the ID argument in manage_booking.php, ensuring proper input sanitization and preventing injection.

Generated by OpenCVE AI on April 18, 2026 at 17:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc event Management System
CPEs cpe:2.3:a:admerc:event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc event Management System

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode event Management System
Vendors & Products Itsourcecode
Itsourcecode event Management System

Thu, 19 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode Event Management System 1.0. Affected is an unknown function of the file /admin/manage_booking.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Title itsourcecode Event Management System manage_booking.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Event Management System
Itsourcecode Event Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T15:48:58.273Z

Reserved: 2026-02-18T14:16:07.400Z

Link: CVE-2026-2689

cve-icon Vulnrichment

Updated: 2026-02-24T15:48:51.496Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T07:17:47.447

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2689

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T18:00:06Z

Weaknesses