Impact
The StoreUnit Rental Management System v1.0 allows attackers to inject arbitrary SQL commands through the /storage/admin/rents/manage_rent.php endpoint. This flaw can be used to read, modify or delete database information, compromising confidentiality, integrity and potentially availability of the system. The weakness is a classic failure to neutralize input values used in SQL statements, corresponding to the well-known CWE-89 class of attack vectors.
Affected Systems
The vulnerability is limited to the Storage Unit Rental Management System version 1.0, a PHP‑based web application that manages rental agreements. No vendor name is listed, but the application is hosted on a web server where the admin section is exposed.
Risk and Exploitability
Because the flaw resides in a publicly accessible web page, attackers can exercise the attack from any internet‑connected location with knowledge of the URL. The lack of CVSS and EPSS data does not diminish the typical severity of an unfiltered SQL injection. The application is not listed in the KEV catalog, yet the potential for data breach or system tampering remains significant without a patch.
OpenCVE Enrichment