Description
A vulnerability was determined in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /tourism/classes/Login.php?f=login of the component Login. This manipulation of the argument Username causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database compromise via SQL injection
Action: Apply Patch
AI Analysis

Impact

This vulnerability resides in the SourceCodester Simple Responsive Tourism Website version 1.0 and is triggered by manipulating the Username parameter in the login function at /tourism/classes/Login.php?f=login. The flaw allows an attacker to inject arbitrary SQL, which can lead to unauthorized database access, data modification, or potential data exfiltration. The entry states that the exploit can be launched remotely and has been publicly disclosed, meaning attackers could target vulnerable installations without physical proximity. Consequently, the application may expose sensitive user data or compromise the integrity of the underlying database.

Affected Systems

The affected product is SourceCodester Simple Responsive Tourism Website, version 1.0, supplied by SourceCodester. No further sub‑products or service versions are identified. Only this single version is known to contain the vulnerability.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% suggests a very low probability of exploitation in the near term, and the vulnerability is currently not listed in the CISA KEV database. The attack vector is inferred to be remote, as the description explicitly allows exploitation from external hosts via the web interface. Attackers would need valid network connectivity to the target and would benefit from knowledge of the login URL path; once the injection succeeds, they could gain read or modify access to database contents. Given the modest severity and low exploitation probability, the risk to an organization depends largely on the sensitivity of the stored data and the overall exposure of the application to the internet.

Generated by OpenCVE AI on April 16, 2026 at 04:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any updates or official patches from SourceCodester.
  • Implement input sanitization or use prepared statements for the login functionality to prevent SQL injection.
  • Configure the server to limit login attempts or block suspicious IPs and monitor logs for anomalies.

Generated by OpenCVE AI on April 16, 2026 at 04:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 simple Responsive Tourism Website
CPEs cpe:2.3:a:oretnom23:simple_responsive_tourism_website:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 simple Responsive Tourism Website

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester simple Responsive Tourism Website
Vendors & Products Sourcecodester
Sourcecodester simple Responsive Tourism Website

Sun, 08 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /tourism/classes/Login.php?f=login of the component Login. This manipulation of the argument Username causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title SourceCodester Simple Responsive Tourism Website Login Login.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Oretnom23 Simple Responsive Tourism Website
Sourcecodester Simple Responsive Tourism Website
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:42:44.520Z

Reserved: 2026-03-07T20:15:47.662Z

Link: CVE-2026-3746

cve-icon Vulnrichment

Updated: 2026-03-11T19:42:41.518Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T16:16:01.600

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3746

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses