Description
A vulnerability has been found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/courses.php. The manipulation of the argument course_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-16
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

The vulnerability exists in the file /admin/courses.php of itsourcecode College Management System 1.0. An attacker can supply a crafted value for the course_code parameter that is passed directly to an SQL statement, allowing an SQL injection to occur. This can result in unauthorized access to the database, including the ability to read, modify, or delete data stored in the system. The weakness is categorized as CWE‑74 (URL Manipulation) and CWE‑89 (SQL Injection).

Affected Systems

The affected product is itsourcecode College Management System version 1.0. No other versions were explicitly listed as impacted in the provided information.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS score is under 1%, suggesting low current exploitation probability. The vulnerability is not included in the CISA KEV catalog, implying it has not been identified in known exploited attacks. Based on the description, the attack vector is remote: an attacker can trigger the flaw by sending an HTTP request to /admin/courses.php with a malicious course_code value. No evidence suggests the flaw could lead to remote code execution; the impact is limited to database access.

Generated by OpenCVE AI on March 17, 2026 at 17:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website for an official patch or update for College Management System 1.0 and apply it immediately.
  • If a patch is not yet available, implement input validation on the course_code parameter to allow only expected values.
  • Refactor the SQL code to use prepared statements or parameterized queries to eliminate direct data insertion.
  • Restrict access to the /admin/courses.php page to trusted administrators or IP ranges, or employ a web application firewall to detect and block suspicious requests.

Generated by OpenCVE AI on March 17, 2026 at 17:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode college Management System
Vendors & Products Itsourcecode
Itsourcecode college Management System

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/courses.php. The manipulation of the argument course_code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title itsourcecode College Management System courses.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode College Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-16T14:48:15.964Z

Reserved: 2026-03-15T20:34:26.346Z

Link: CVE-2026-4238

cve-icon Vulnrichment

Updated: 2026-03-16T14:48:11.825Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:20:18.460

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-4238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:26Z

Weaknesses