Description
A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is an unknown function of the file /admin/index.php. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Published: 2026-02-23
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to unauthorized database access
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the admin/index.php file of itsourcecode Event Management System 1.0, where the ID parameter is not properly validated, allowing an attacker to inject arbitrary SQL code. By manipulating this argument an attacker can read, modify, or delete data in the underlying database, potentially exposing confidential information and altering the integrity of the application. This flaw can compromise the confidentiality and integrity of the system’s data store.

Affected Systems

Vendor itsourcecode offers the Event Management System product, version 1.0, which is affected by this issue. Users running this specific version should consider it vulnerable until a fix is applied.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the EPSS score of less than 1% suggests a low current exploitation probability, yet the vulnerability is publicly reported and can be exploited remotely via a standard web request to /admin/index.php. It is not listed in the CISA KEV catalog, but the ability to inject SQL remotely poses a significant risk to any exposed database and could be a stepping stone to further attacks if additional credentials or lateral movement capabilities are available.

Generated by OpenCVE AI on April 17, 2026 at 16:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Use prepared statements or parameterized queries for all database interactions involving user input
  • Apply the vendor’s security update or patch as soon as it becomes available
  • Restrict the /admin/index.php URL to authorized administrators using authentication and IP address whitelisting
  • Implement a web application firewall rule set that detects and blocks common SQL injection patterns
  • Review database logs regularly for abnormal query activity and investigate suspicious events

Generated by OpenCVE AI on April 17, 2026 at 16:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc event Management System
CPEs cpe:2.3:a:admerc:event_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc event Management System

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode event Management System
Vendors & Products Itsourcecode
Itsourcecode event Management System

Mon, 23 Feb 2026 23:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in itsourcecode Event Management System 1.0. The affected element is an unknown function of the file /admin/index.php. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.
Title itsourcecode Event Management System index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Event Management System
Itsourcecode Event Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-25T16:09:18.734Z

Reserved: 2026-02-23T16:46:01.011Z

Link: CVE-2026-3042

cve-icon Vulnrichment

Updated: 2026-02-25T16:09:10.504Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T00:16:18.900

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:15:22Z

Weaknesses