Description
A vulnerability has been found in SourceCodester Student Result Management System 1.0. The affected element is an unknown function of the file /srms/script/admin/core/update_smtp.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-02-22
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote access control bypass leading to possible SMTP configuration compromise
Action: Patch Immediately
AI Analysis

Impact

An unknown function in the Student Result Management System 1.0 update_smtp.php allows manipulation that bypasses intended access controls. The vulnerability aligns with improper privilege management and improper access control weaknesses. The flaw may permit the alteration of SMTP settings or the use of application email capabilities for unauthorized activity. The issue is catalogued under CWE-266 and CWE-284.

Affected Systems

The affected product is SourceCodester Student Result Management System version 1.0. Vulnerability resides in the core update_smtp.php script that handles SMTP configuration. No other versions or products are listed as affected.

Risk and Exploitability

The CVSS score of 6.9 denotes a moderate severity. Exploit probability is very low, with an EPSS score below 1%. The flaw is not reported in the CISA KEV catalog. The description states the flaw can be triggered remotely, and publicly disclosed exploit demonstrates the possibility of manipulating the target function. The risk remains moderate, but the lack of widespread exploitation does not diminish the need for corrective action.

Generated by OpenCVE AI on April 18, 2026 at 11:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any official patch or upgrade SourceCodester Student Result Management System to a version that resolves the update_smtp.php access control flaw.
  • If a patch is unavailable, configure the web server to restrict access to the /srms/script/admin/core/update_smtp.php endpoint so that only authenticated administrators can reach it, using .htaccess, nginx allow, or equivalent mechanisms.
  • Disable or remove the ability to modify SMTP settings entirely until a reliable fix is applied, and monitor the application logs for any attempts to alter SMTP configuration.
  • Conduct a review of administrative permissions to ensure only privileged accounts can modify core configuration files.

Generated by OpenCVE AI on April 18, 2026 at 11:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Munyweki
Munyweki student Result Management System
CPEs cpe:2.3:a:munyweki:student_result_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Munyweki
Munyweki student Result Management System

Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester student Result Management System
Vendors & Products Sourcecodester
Sourcecodester student Result Management System

Sun, 22 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in SourceCodester Student Result Management System 1.0. The affected element is an unknown function of the file /srms/script/admin/core/update_smtp.php. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title SourceCodester Student Result Management System update_smtp.php access control
Weaknesses CWE-266
CWE-284
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Munyweki Student Result Management System
Sourcecodester Student Result Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T18:29:24.137Z

Reserved: 2026-02-21T15:08:04.958Z

Link: CVE-2026-2938

cve-icon Vulnrichment

Updated: 2026-02-25T18:29:14.120Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T09:16:11.630

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses