Description
A vulnerability was determined in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /att_add.php. This manipulation of the argument Name causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-11
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

The affected component is the /att_add.php file of itsourcecode University Management System 1.0, where manipulating the Name argument leads to an SQL injection vulnerability. An attacker can introduce arbitrary SQL statements, enabling unauthorized reading or modification of the university’s database. This poses a risk to confidentiality and integrity; the vulnerability is flagged as a remote attack, meaning it can be triggered from outside the network.

Affected Systems

The vulnerability affects the University Management System version 1.0 produced by itsourcecode. The Common Platform Enumeration provided confirms the scope of the affected product: cpe:2.3:a:angeljudesuarez:university_management_system:1.0:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score is 6.9, indicating medium severity. The EPSS score is reported as < 1%, suggesting a low likelihood of active exploitation at any given time. The vulnerability is not listed in the CISA KEV catalog. Because the attack may be initiated remotely and the exploit has been publicly disclosed, the risk remains significant if the system remains unpatched. No additional exploit prerequisites are detailed in the provided data.

Generated by OpenCVE AI on March 17, 2026 at 17:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact the vendor to request a patch or upgrade that addresses the SQL injection flaw in /att_add.php.
  • If an immediate patch is unavailable, restrict web traffic to /att_add.php to trusted IP addresses and consider implementing input validation or sanitization on the Name parameter.
  • Deploy a Web Application Firewall that filters known SQL injection patterns and monitor the application logs for suspicious activity.

Generated by OpenCVE AI on March 17, 2026 at 17:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Angeljudesuarez
Angeljudesuarez university Management System
CPEs cpe:2.3:a:angeljudesuarez:university_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Angeljudesuarez
Angeljudesuarez university Management System

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode university Management System
Vendors & Products Itsourcecode
Itsourcecode university Management System

Wed, 11 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode University Management System 1.0. This vulnerability affects unknown code of the file /att_add.php. This manipulation of the argument Name causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode University Management System att_add.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Angeljudesuarez University Management System
Itsourcecode University Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T13:11:04.978Z

Reserved: 2026-03-11T06:37:26.948Z

Link: CVE-2026-3944

cve-icon Vulnrichment

Updated: 2026-03-11T13:10:41.136Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T13:16:12.537

Modified: 2026-03-12T15:00:07.940

Link: CVE-2026-3944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:20Z

Weaknesses