Description
A vulnerability was determined in itsourcecode Vehicle Management System 1.0. Affected is an unknown function of the file /billaction.php. Executing a manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-21
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch Now
AI Analysis

Impact

A vulnerability exists in the itsourcecode Vehicle Management System 1.0 within an unspecified function of /billaction.php. Manipulation of the ID argument can trigger a SQL injection, allowing an attacker to inject arbitrary SQL statements. The weakness corresponds to Code Injection and improper input handling weaknesses (CWE-74, CWE-89). The impact of successfully exploiting this flaw includes unauthorized data retrieval, modification, or potentially complete database compromise, thereby threatening confidentiality, integrity, and availability of the system's data. The description does not state that the attacker achieves remote code execution, but the injection potential could allow execution of privileged SQL statements that may lead to further exploitation.

Affected Systems

The affected product is itsourcecode Vehicle Management System version 1.0. No other versions or subcomponents were explicitly listed; the vulnerability resides in the /billaction.php module of this product.

Risk and Exploitability

The reported CVSS score of 6.9 falls in the medium severity range, while the EPSS score of less than 1% indicates a low public exploitation probability at the time of analysis. The vulnerability is not listed in CISA’s KEV catalog. According to the description, the attack may be launched remotely via web requests, suggesting that an unauthenticated or authenticated external user can craft a request to the ID parameter. Successful exploitation would allow the attacker to inject SQL commands into the backend database, potentially leading to data exfiltration, corruption, or unauthorized administrative actions. The exploit has been publicly disclosed and is theoretically usable, but the low EPSS suggests limited immediate danger.

Generated by OpenCVE AI on April 17, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Vehicle Management System to the latest vendor release that sanitizes the ID parameter in billaction.php.
  • If an update is unavailable, disable or block remote access to billaction.php until a patch is applied.
  • Verify that ID values are strictly numeric and use prepared statements or parameterized queries to prevent injection.
  • Ensure the application uses the least-privileged database account to limit potential damage from injected SQL.

Generated by OpenCVE AI on April 17, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc vehicle Management System
CPEs cpe:2.3:a:admerc:vehicle_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc vehicle Management System

Mon, 23 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode vehicle Management System
Vendors & Products Itsourcecode
Itsourcecode vehicle Management System

Sat, 21 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode Vehicle Management System 1.0. Affected is an unknown function of the file /billaction.php. Executing a manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode Vehicle Management System billaction.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Vehicle Management System
Itsourcecode Vehicle Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:33:52.753Z

Reserved: 2026-02-20T14:27:22.417Z

Link: CVE-2026-2867

cve-icon Vulnrichment

Updated: 2026-02-23T19:33:44.321Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-21T14:15:57.983

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2867

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T17:00:10Z

Weaknesses