Description
A flaw has been found in SourceCodester Employee Task Management System up to 1.0. The affected element is an unknown function of the file /daily-task-report.php of the component GET Parameter Handler. This manipulation of the argument Date causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-03-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

The vulnerability is a classic SQL injection that occurs when the Date parameter in daily-task-report.php is processed without proper sanitization. An attacker can inject arbitrary SQL, allowing data extraction or modification. The flaw stems from a developer mistake in handling GET values, specifically an unknown function that passes the Date argument straight into a query. This weakness is classified as CWE-74 and CWE-89. The impact is the potential compromise of data confidentiality and integrity on the system hosting the Employee Task Management System.

Affected Systems

SourceCodester Employee Task Management System, version 1.0 and earlier. The issue resides in the daily-task-report.php file accessed via the GET parameter Date. The product is distributed under the oretnom23:employee_task_management_system package. No specific build or patch level is listed beyond 1.0, so any installation of the 1.0 release is affected.

Risk and Exploitability

CVSS v3.1 score of 5.1 indicates moderate severity. The EPSS score of less than 1 % reflects a very low exploitation probability at this time. The vulnerability is not listed in the CISA KEV catalog. The remote nature of the attack allows an unauthenticated or authenticated user to craft the Date parameter and inject SQL code. The published exploit demonstrates that this attack can be executed from a remote host without requiring privileged local access.

Generated by OpenCVE AI on April 16, 2026 at 04:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a supported version that removes the SQL injection vulnerability in daily-task-report.php.
  • Sanitize the Date input by validating it against a strict date format or using prepared statements to prevent injectivity.
  • Restrict access to daily-task-report.php to authenticated users only, or place the script behind stricter access controls.

Generated by OpenCVE AI on April 16, 2026 at 04:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 employee Task Management System
CPEs cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 employee Task Management System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester employee Task Management System
Vendors & Products Sourcecodester
Sourcecodester employee Task Management System

Sun, 08 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in SourceCodester Employee Task Management System up to 1.0. The affected element is an unknown function of the file /daily-task-report.php of the component GET Parameter Handler. This manipulation of the argument Date causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title SourceCodester Employee Task Management System GET Parameter daily-task-report.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Oretnom23 Employee Task Management System
Sourcecodester Employee Task Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:35:10.919Z

Reserved: 2026-03-07T20:27:31.540Z

Link: CVE-2026-3752

cve-icon Vulnrichment

Updated: 2026-03-11T19:35:07.084Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T17:16:08.933

Modified: 2026-03-09T16:32:27.700

Link: CVE-2026-3752

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses