Description
A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/check_studid.php. Executing a manipulation of the argument student_id can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection
Action: Immediate Patch
AI Analysis

Impact

A weakness in the admin functionality of itsourcecode Society Management System 1.0 allows attackers to inject arbitrary SQL through the student_id parameter in check_studid.php. Because the input is not properly validated or escaped, it can be embedded directly in database queries, potentially enabling data disclosure, modification, or deletion. The exploit can be launched remotely, meaning an attacker does not need local access to the server, and attack code has been made publicly available.

Affected Systems

Society Management System version 1.0 by itsourcecode, specifically the /admin/check_studid.php endpoint handling the student_id argument. No other product versions or vendors are documented as affected.

Risk and Exploitability

The CVSS score of 6.9 places the vulnerability in the moderate severity range, while the EPSS score of less than 1% indicates a low current probability of exploitation. Although the vulnerability is not listed in the CISA KEV catalog, the combination of a remote attack vector and publicly available exploit code raises the risk for organizations that expose the /admin area to the internet. An attacker exploiting this flaw could gain read or write access to the database, compromising confidentiality, integrity, and potentially availability of the system.

Generated by OpenCVE AI on April 17, 2026 at 13:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s security patch or upgrade to the latest version of Society Management System if available.
  • Restrict external network access to the /admin/check_studid.php endpoint using firewall rules or IP whitelisting, ensuring only authorized administrators can reach it.
  • Modify the application code to validate and sanitize the student_id input, preferably by using prepared statements or stored procedures that eliminate the possibility of injection.

Generated by OpenCVE AI on April 17, 2026 at 13:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez society Management System
CPEs cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez society Management System

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode society Management System
Vendors & Products Itsourcecode
Itsourcecode society Management System

Mon, 02 Mar 2026 04:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/check_studid.php. Executing a manipulation of the argument student_id can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title itsourcecode Society Management System check_studid.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez Society Management System
Itsourcecode Society Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-02T15:01:57.071Z

Reserved: 2026-03-01T09:40:47.447Z

Link: CVE-2026-3410

cve-icon Vulnrichment

Updated: 2026-03-02T15:01:48.651Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T05:16:19.717

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3410

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T13:45:16Z

Weaknesses