Description
SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/manage_employee.php.
Published: 2026-04-14
Score: 2.7 Low
EPSS: n/a
KEV: No
Impact: Unauthorized data access and modification
Action: Apply Patch
AI Analysis

Impact

This vulnerability is a classic SQL injection flaw located in the file /wfh_attendance/admin/manage_employee.php of the SourceCodester Online Employees Work From Home Attendance System. By injecting malicious SQL into the input fields, an attacker can alter the query that the application sends to the database. Such manipulation could allow an attacker to read sensitive employee data, modify attendance records, delete records, or gain higher privileges within the database. The severity depends on the privileges of the exploited account, but any successful injection can compromise the confidentiality, integrity, and availability of the attendance information.

Affected Systems

Affected systems are all installations of SourceCodester Online Employees Work From Home Attendance System version 1.0, as this is the only version documented with the flaw. No other vendor or product listings are provided in the current data.

Risk and Exploitability

No CVSS or EPSS scores are supplied, so the exact risk rating cannot be calculated from the data. However, given that the vulnerability is a SQL injection, the attack vector likely requires that the attacker can reach the vulnerable endpoint, and may require an authenticated session to the admin area. In the absence of a publicly available exploit, the likelihood of exploitation remains uncertain, but it is prudent to treat the flaw as high risk until it is remediated. Since it is not listed in KEV, no confirmed exploitation has been reported yet, but it could be targeted by attackers due to the ubiquitous nature of SQL injection.

Generated by OpenCVE AI on April 14, 2026 at 15:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available patch or upgrade to a newer version of the Software. If no patch is available, implement input validation and use parameterized queries for the vulnerable file.
  • Restrict access to the admin interface to authorized users only.
  • Enable web application firewall rules that block SQL injection patterns.
  • Monitor logs for suspicious database queries.

Generated by OpenCVE AI on April 14, 2026 at 15:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title SQL Injection in SourceCodester Online Employees Work From Home Attendance System

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester online Employees Work From Home Attendance System
Vendors & Products Sourcecodester
Sourcecodester online Employees Work From Home Attendance System

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description SourceCodester Online Employees Work From Home Attendance System v1.0 is vulnerable to SQL Injection in the file /wfh_attendance/admin/manage_employee.php.
References

Subscriptions

Sourcecodester Online Employees Work From Home Attendance System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T15:28:38.905Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37595

cve-icon Vulnrichment

Updated: 2026-04-14T15:28:17.020Z

cve-icon NVD

Status : Received

Published: 2026-04-14T15:16:33.393

Modified: 2026-04-14T16:16:41.733

Link: CVE-2026-37595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:31:51Z

Weaknesses