Description
A security flaw has been discovered in itsourcecode News Portal Project 1.0. The affected element is an unknown function of the file /newsportal/admin/edit-category.php. The manipulation of the argument Category results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw exists in the News Portal Project 1.0 code under /newsportal/admin/edit-category.php, where a Category argument can be manipulated to inject arbitrary SQL statements. The vulnerability is based on improper handling of user input (CWE-74) and the classic SQL Injection weakness (CWE-89). If exploited, an attacker can read, modify, or delete database records. The impact threatens data confidentiality, integrity, and could lead to full compromise of the application.

Affected Systems

The affected product is itsourcecode News Portal Project 1.0, the only version mentioned in the advisory. No other releases or vendor versions are listed. Administrators managing this specific build are exposed to the risk.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate-assessable severity, while the EPSS score of less than 1% suggests a low exploitation probability in the current moment. The vulnerability is not part of the CISA KEV catalog, but public exploit code has been released and can be performed remotely via an HTTP request to edit-category.php. Attackers would need network access to the admin interface and can leverage the unsanitized Category parameter to inject SQL.

Generated by OpenCVE AI on April 17, 2026 at 15:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a secure version of the News Portal Project.
  • Use parameterized queries or prepared statements to eliminate direct SQL string construction.
  • Implement a web application firewall or input filtering to block SQL injection payloads.

Generated by OpenCVE AI on April 17, 2026 at 15:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Clive 21
Clive 21 news Portal Project
CPEs cpe:2.3:a:clive_21:news_portal_project:1.0:*:*:*:*:*:*:*
Vendors & Products Clive 21
Clive 21 news Portal Project

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode news Portal Project
Vendors & Products Itsourcecode
Itsourcecode news Portal Project

Wed, 25 Feb 2026 00:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in itsourcecode News Portal Project 1.0. The affected element is an unknown function of the file /newsportal/admin/edit-category.php. The manipulation of the argument Category results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Title itsourcecode News Portal Project edit-category.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Clive 21 News Portal Project
Itsourcecode News Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:54:52.791Z

Reserved: 2026-02-24T17:26:36.428Z

Link: CVE-2026-3134

cve-icon Vulnrichment

Updated: 2026-02-27T18:54:49.363Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T00:16:32.983

Modified: 2026-02-25T20:24:20.550

Link: CVE-2026-3134

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:45:15Z

Weaknesses