Description
A weakness has been identified in itsourcecode News Portal Project 1.0. The impacted element is an unknown function of the file /admin/add-category.php. This manipulation of the argument Category causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-02-25
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection enabling unauthorized data modification
Action: Immediate Patch
AI Analysis

Impact

A weakness in the add-category.php page allows an attacker to inject SQL through the Category field, enabling unauthorized manipulation of the underlying database. This is a classic input validation flaw (CWE‑74 and CWE‑89) and can be exploited remotely using a crafted request. Successful exploitation would allow an attacker to read, alter, or delete data within the administration area, potentially leading to full compromise of the content management system.

Affected Systems

itsourcecode’s News Portal Project, version 1.0, as delivered from the /admin/add-category.php script, is affected. No other product versions are listed as impacted in the available data.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.9, indicating medium severity. The EPSS score is less than 1%, suggesting a low to very low probability of current exploitation, and the issue is not in the CISA Known Exploited Vulnerabilities catalog. Nonetheless, the stated public availability of an exploit and the remote trigger via the Category parameter mean that an attacker could readily use this flaw to compromise the application if no controls are in place.

Generated by OpenCVE AI on April 17, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor-released patch or upgrade to a newer, secure version of the News Portal Project as soon as it becomes available.
  • Replace or sanitize the Category input with strict validation or a whitelist of approved values, and use parameterized queries to eliminate direct SQL embedding.
  • If a patch is not immediately available, disable or restrict access to the add-category functionality until the flaw is remediated, and consider implementing a web application firewall rule to block SQL injection patterns against the Category parameter.

Generated by OpenCVE AI on April 17, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Clive 21
Clive 21 news Portal Project
CPEs cpe:2.3:a:clive_21:news_portal_project:1.0:*:*:*:*:*:*:*
Vendors & Products Clive 21
Clive 21 news Portal Project

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode news Portal Project
Vendors & Products Itsourcecode
Itsourcecode news Portal Project

Wed, 25 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in itsourcecode News Portal Project 1.0. The impacted element is an unknown function of the file /admin/add-category.php. This manipulation of the argument Category causes sql injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks.
Title itsourcecode News Portal Project add-category.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Clive 21 News Portal Project
Itsourcecode News Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-26T20:57:10.132Z

Reserved: 2026-02-24T17:27:51.664Z

Link: CVE-2026-3135

cve-icon Vulnrichment

Updated: 2026-02-26T20:57:04.428Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T01:16:09.320

Modified: 2026-02-25T20:20:27.890

Link: CVE-2026-3135

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:45:15Z

Weaknesses