Description
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/view_parked_details.php.
Published: 2026-04-16
Score: n/a
EPSS: n/a
KEV: No
Impact: Data Compromise
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the file /parking/view_parked_details.php of SourceCodester Vehicle Parking Area Management System v1.0 and allows unauthenticated attackers to inject arbitrary SQL statements. By manipulating input parameters without proper escaping or parameterization, a malicious user can execute commands such as SELECT, UPDATE, or DELETE on the underlying database, potentially exposing sensitive vehicle and user data or altering system records. This type of flaw is a classic data‑exfiltration problem, classified under processed data confidentiality and integrity weaknesses.

Affected Systems

The affected product is SourceCodester Vehicle Parking Area Management System version 1.0, a web application designed for managing parking facilities. The vulnerability is specifically located in the parking view page, and no variants or higher versions have been publicly identified as affected. The product is deployed on typical LAMP stacks, and the exposure is through HTTP requests to the mentioned PHP page.

Risk and Exploitability

EPSS data and KEV status are currently unavailable, so the exploitation probability cannot be quantified. Nevertheless, the attack vector is remote over the standard web interface, and skilled attackers could exploit the flaw immediately if the application is exposed to untrusted traffic. Since there is no vendor‑issued patch or alternative, the risk remains high for systems running default configurations that allow raw SQL manipulation. Administrators should treat this as a critical issue until a remediation is applied.

Generated by OpenCVE AI on April 17, 2026 at 04:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If an update or patch is released by SourceCodester, install it immediately.
  • Update the application code to use prepared statements or parameterized queries in view_parked_details.php to eliminate unescaped SQL inputs.
  • Restrict the database user role to read‑only permissions for actions that do not require write access, or at least grant minimal privileges necessary for the application.
  • Deploy a web application firewall rule to block common SQL injection signatures on the /parking/view_parked_details.php endpoint as a temporary protection.

Generated by OpenCVE AI on April 17, 2026 at 04:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Vehicle Parking Area Management System
Weaknesses CWE-89

Thu, 16 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester vehicle Parking Area Management System
Vendors & Products Sourcecodester
Sourcecodester vehicle Parking Area Management System

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/view_parked_details.php.
References

Subscriptions

Sourcecodester Vehicle Parking Area Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-16T14:52:06.099Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37342

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-16T15:17:37.120

Modified: 2026-04-16T15:17:37.120

Link: CVE-2026-37342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T05:00:05Z

Weaknesses