Description
A flaw has been found in itsourcecode Event Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login of the component Admin Login. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-02-19
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access
Action: Apply Patch
AI Analysis

Impact

A flaw in the admin login feature of itsourcecode Event Management System 1.0 allows an attacker to manipulate the Username field to inject arbitrary SQL. This vulnerability is a classic SQL injection that can be triggered remotely via the /admin/ajax.php endpoint. If successfully exploited, an attacker could read, modify, or delete database data, compromising sensitive event details and potentially exposing user credentials.

Affected Systems

The affected product is itsourcecode Event Management System version 1.0, released by itsourcecode. No other versions have been documented as vulnerable. All installations running that specific version are at risk until the flaw is addressed.

Risk and Exploitability

The CVSS score of 6.9 places this flaw in the medium range, while an EPSS of less than 1 % suggests a low current likelihood of widespread exploitation. Nevertheless, because the attack can be performed over the internet and public proof‑of‑concept code exists, the potential impact remains significant. The vulnerability is not listed in the CISA KEV catalog, indicating that no large‑scale incidents have been reported yet, but the availability of exploits warrants timely mitigation.

Generated by OpenCVE AI on April 18, 2026 at 11:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain and install the latest release of the Event Management System that eliminates the SQL injection vulnerability; if a patch is not available, contact the vendor for an interim fix.
  • Validate and sanitize the Username field on the server side, using strict input constraints and parameterized SQL queries to prevent injection attacks.
  • Restrict access to the /admin/ajax.php endpoint through network controls such as firewalls or VPNs, limiting exposure to trusted administrators.

Generated by OpenCVE AI on April 18, 2026 at 11:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc event Management System
CPEs cpe:2.3:a:admerc:event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc event Management System

Tue, 24 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode event Management System
Vendors & Products Itsourcecode
Itsourcecode event Management System

Thu, 19 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Event Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login of the component Admin Login. This manipulation of the argument Username causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title itsourcecode Event Management System Admin Login ajax.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Event Management System
Itsourcecode Event Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T15:45:07.906Z

Reserved: 2026-02-18T14:16:10.741Z

Link: CVE-2026-2690

cve-icon Vulnrichment

Updated: 2026-02-24T15:45:03.097Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-19T07:17:47.670

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2690

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses