Description
SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/manage_user.php.
Published: 2026-04-16
Score: n/a
EPSS: n/a
KEV: No
Impact: Unauthorized Data Access
Action: Apply Mitigation
AI Analysis

Impact

The vulnerability is a classic SQL Injection flaw found in the /parking/manage_user.php file of SourceCodester Vehicle Parking Area Management System v1.0. It allows an attacker to inject arbitrary SQL statements into the database query that the application executes. Because the code concatenates user‑provided input directly into a SQL statement, the attacker can read, modify, or delete data stored in the backend database, and potentially manipulate the application’s control flow. The CWE for this weakness is CWE‑89, which describes unsanitized SQL query handling that can lead to data confidentiality and integrity compromise.

Affected Systems

The affected product is SourceCodester Vehicle Parking Area Management System (v1.0). No other vendors or products are listed in the CNA data. The vulnerability resides specifically in the /parking/manage_user.php file, which handles user management functions, so any installation of version 1.0 that exposes this endpoint is vulnerable.

Risk and Exploitability

No EPSS score is available, and the vulnerability has not been listed in the CISA KEV catalog. The attack vector is HTTP, where the attacker submits crafted input to the /parking/manage_user.php form or query string. Successful exploitation requires the ability to send requests to the target server; no authentication is mentioned in the description, so the assumption is the endpoint is publicly reachable. The attacker can then alter or extract data, depending on privileges granted to the database user. Because the flaw is straightforward and no countermeasures are noted, the risk is moderate to high in environments where the vehicle parking area management system is exposed to untrusted users.

Generated by OpenCVE AI on April 17, 2026 at 06:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace string‑concatenated SQL queries in /parking/manage_user.php with prepared statements or parameterized queries to ensure user input is never parsed as executable SQL.
  • Validate and sanitize all user‑supplied data before it is passed to the database, rejecting or escaping SQL‑special characters where appropriate.
  • If an official vendor patch or newer release is not available, deploy a web‑application firewall rule or server‑side filter that blocks common SQL injection payloads and suspicious keywords sent to the /parking/manage_user.php endpoint.

Generated by OpenCVE AI on April 17, 2026 at 06:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 06:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in Vehicle Parking Area Management System
Weaknesses CWE-89

Thu, 16 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester vehicle Parking Area Management System
Vendors & Products Sourcecodester
Sourcecodester vehicle Parking Area Management System

Thu, 16 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/manage_user.php.
References

Subscriptions

Sourcecodester Vehicle Parking Area Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-16T14:53:42.067Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-16T15:17:37.230

Modified: 2026-04-16T15:17:37.230

Link: CVE-2026-37343

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T06:30:11Z

Weaknesses