Description
A vulnerability was determined in SourceCodester Client Database Management System 1.0. The impacted element is an unknown function of the file /superadmin_user_update.php. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization
Action: Assess Impact
AI Analysis

Impact

A flaw in the SourceCodester Client Database Management System 1.0 allows attackers to manipulate the superadmin_user_update.php endpoint and bypass the necessary authorization checks. This improper authorization can enable unauthorized modification of user accounts, including the assignment of superadmin privileges, thereby compromising data integrity and potentially granting the attacker elevated control over the system. The weakness corresponds to authorisation bypass and improper access control categories.

Affected Systems

The vulnerability affects the SourceCodester Client Database Management System version 1.0, as identified by the vendor's product listing.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity level, while the EPSS value suggests a low probability of exploitation. The vulnerability is not recorded in the CISA Known Exploited Vulnerabilities catalog, implying no confirmed large-scale exploitation. The attack vector is remote, requiring the attacker to send crafted requests to the publicly accessible superadmin_user_update.php endpoint, which if unprotected can lead to privilege escalation or unauthorized data changes.

Generated by OpenCVE AI on April 17, 2026 at 11:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑released patch or upgrade to a newer version that corrects the flawed authorization logic in superadmin_user_update.php.
  • Restrict direct HTTP access to superadmin_user_update.php, using web‑server access controls such as IP whitelisting, authentication mechanisms, or firewall rules to limit the endpoint to trusted administrators.
  • Implement strict role‑based access controls by validating a user’s administrative status before processing any superadmin_user_update.php requests; conduct a code review to verify that all privileged functions enforce the appropriate role checks.

Generated by OpenCVE AI on April 17, 2026 at 11:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Lerouxyxchire
Lerouxyxchire client Database Management System
CPEs cpe:2.3:a:lerouxyxchire:client_database_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Lerouxyxchire
Lerouxyxchire client Database Management System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester client Database Management System
Vendors & Products Sourcecodester
Sourcecodester client Database Management System

Sun, 08 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in SourceCodester Client Database Management System 1.0. The impacted element is an unknown function of the file /superadmin_user_update.php. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title SourceCodester Client Database Management System superadmin_user_update.php improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Lerouxyxchire Client Database Management System
Sourcecodester Client Database Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:40:19.070Z

Reserved: 2026-03-07T20:45:32.507Z

Link: CVE-2026-3764

cve-icon Vulnrichment

Updated: 2026-03-10T20:40:16.673Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T20:15:49.423

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3764

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:00:11Z

Weaknesses