Description
A flaw has been found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Request Forgery leading to unauthorized actions
Action: Immediate Patch
AI Analysis

Impact

An attacker can use cross‑site request forgery to manipulate SourceCodester Computer Laboratory Management System 1.0. The weakness stems from a lack of proper CSRF protection, allowing forged requests to be accepted by the server as if they originated from an authenticated user. As a result, attackers could perform unintended state‑changing operations such as modifying or deleting data, compromising data integrity and potentially exposing sensitive information. Based on the nature of CSRF, it is inferred that the victim must be logged in for the forged requests to succeed.

Affected Systems

The vulnerability affects the SourceCodester Computer Laboratory Management System, version 1.0. No other products or versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, while an EPSS score of less than 1% suggests low exploitation probability up to now. The vulnerability is not in the CISA KEV catalog, and the exploit is thought to be remote. Attackers can exploit the flaw by crafting malicious requests and forcing a victim’s browser to execute them, with the server trusting their origin.

Generated by OpenCVE AI on April 16, 2026 at 10:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched version of SourceCodester Computer Laboratory Management System if one is available.
  • If an update is not yet available, implement a CSRF token mechanism that validates requests against a server‑generated token stored in the user session.
  • Enforce same‑site cookie attributes and restrict sensitive actions to authenticated users only.
  • Monitor web server logs for abnormal or unexpected POST requests and investigate any suspicious activity.

Generated by OpenCVE AI on April 16, 2026 at 10:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Oretnom23
Oretnom23 computer Laboratory Management System
CPEs cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Oretnom23
Oretnom23 computer Laboratory Management System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester computer Laboratory Management System
Vendors & Products Sourcecodester
Sourcecodester computer Laboratory Management System

Sun, 08 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in SourceCodester Computer Laboratory Management System 1.0. This affects an unknown part. This manipulation causes cross-site request forgery. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title SourceCodester Computer Laboratory Management System cross-site request forgery
Weaknesses CWE-352
CWE-862
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Oretnom23 Computer Laboratory Management System
Sourcecodester Computer Laboratory Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T20:37:30.660Z

Reserved: 2026-03-07T20:57:35.001Z

Link: CVE-2026-3770

cve-icon Vulnrichment

Updated: 2026-03-10T20:37:27.269Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T21:15:51.673

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3770

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses