Description
A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected is an unknown function of the file /edtlbls.php. The manipulation of the argument field1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-02-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection leading to data disclosure or tampering
Action: Patch Now
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary SQL through the field1 argument in the /edtlbls.php script of itsourcecode's Document Management System. Exploitation can be performed remotely, giving the attacker the ability to read, modify, or delete data stored in the underlying database, compromising confidentiality, integrity, and potentially availability. The defect is a classic injection flaw aligned with CWE‑74 and SQL injection (CWE‑89).

Affected Systems

The affected product is itsourcecode Document Management System 1.0, specifically the undocumented function referenced in the /edtlbls.php file. No other versions or components were identified.

Risk and Exploitability

The CVSS score of 6.9 rates the vulnerability as medium severity, and the EPSS score of less than 1% suggests that exploitation attempts are currently rare. The vulnerability is not listed in CISA's KEV catalog. Attackers can initiate the exploit from an external network, as the attack vector is remote. Publicly disclosed exploit scripts exist, so the risk of exploitation remains real, particularly if the system is exposed to the internet without mitigation.

Generated by OpenCVE AI on April 18, 2026 at 10:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch that resolves the SQL injection in /edtlbls.php for Document Management System 1.0.
  • Configure the web server or firewall to limit access to the Document Management System only to trusted IP addresses or internal network segments.
  • Modify the application to validate the field1 input and use parameterized queries or prepared statements to eliminate injection opportunities.

Generated by OpenCVE AI on April 18, 2026 at 10:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Admerc
Admerc document Management System
CPEs cpe:2.3:a:admerc:document_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Admerc
Admerc document Management System

Tue, 24 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode document Management System
Vendors & Products Itsourcecode
Itsourcecode document Management System

Tue, 24 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in itsourcecode Document Management System 1.0. Affected is an unknown function of the file /edtlbls.php. The manipulation of the argument field1 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title itsourcecode Document Management System edtlbls.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Admerc Document Management System
Itsourcecode Document Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T18:10:09.581Z

Reserved: 2026-02-23T18:56:05.931Z

Link: CVE-2026-3069

cve-icon Vulnrichment

Updated: 2026-02-24T18:09:58.536Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T05:17:18.333

Modified: 2026-02-24T21:04:26.693

Link: CVE-2026-3069

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses