Description
A vulnerability was identified in itsourcecode University Management System 1.0. Affected by this issue is some unknown functionality of the file /add_result.php. Such manipulation of the argument subject leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

A vulnerability has been identified in itsourcecode University Management System version 1.0, specifically in the add_result.php handler. An attacker can tamper with the subject parameter to insert malicious SQL, allowing untrusted input to be executed directly against the database. This flaw qualifies as an SQL injection vulnerability, listed under CWE‑74 and CWE‑89. The injection can be performed remotely because the vulnerable page is exposed to external traffic; attackers may read, modify, or delete data through crafted requests.

Affected Systems

The affected product is itsourcecode University Management System version 1.0. No other vendors or versions are listed as impacted. The vulnerability resides in the add_result.php component of that system.

Risk and Exploitability

The CVSS v3.1 score of 6.9 indicates a medium severity risk. The EPSS score is less than 1%, reflecting a low probability that this flaw is currently being exploited in the wild. It is not yet cataloged in CISA’s KEV list. Because the flaw can be triggered via a remote HTTP request, the attacker only needs network connectivity to the vulnerable service and does not require elevated privileges on the host. Publicly available exploit code was observed, which could expedite attacks if the target is not patched.

Generated by OpenCVE AI on April 16, 2026 at 04:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade the system to a version that resolves the add_result.php injection flaw.
  • Modify the add_result.php code to use prepared statements or parameterized queries for all database interactions involving the subject input.
  • Validate and sanitize user‑supplied subject values before incorporating them into SQL statements.
  • Conduct a comprehensive review of all input handling throughout the application to ensure similar injection points are eliminated.
  • Configure web application firewall rules to detect and block SQL injection patterns targeting the subject parameter.

Generated by OpenCVE AI on April 16, 2026 at 04:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez university Management System
CPEs cpe:2.3:a:angeljudesuarez:university_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez university Management System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode university Management System
Vendors & Products Itsourcecode
Itsourcecode university Management System

Sun, 08 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode University Management System 1.0. Affected by this issue is some unknown functionality of the file /add_result.php. Such manipulation of the argument subject leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
Title itsourcecode University Management System add_result.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez University Management System
Itsourcecode University Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:43:15.342Z

Reserved: 2026-03-07T20:16:32.471Z

Link: CVE-2026-3747

cve-icon Vulnrichment

Updated: 2026-03-11T19:43:10.953Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T16:16:01.810

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3747

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses