Description
A security vulnerability has been detected in SourceCodester Simple E-learning System 1.0. This affects an unknown part of the file /includes/form_handlers/delete_post.php of the component HTTP GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability lies in the delete_post.php handler of SourceCodester Simple E-learning System, where an attacker can supply a crafted post_id via the HTTP GET parameter. This manipulation allows arbitrary SQL statements to be executed against the database, potentially exposing, modifying, or deleting sensitive course and user data. The flaw stems from insufficient input validation and direct inclusion of the parameter in SQL queries (CWE-89).

Affected Systems

The flaw exists in SourceCodester Simple E-learning System version 1.0, specifically within the file /includes/form_handlers/delete_post.php. No other variants or versions were identified in the CVE data.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate risk, and while no EPSS value is available, the vulnerability was publicly disclosed and can be exploited remotely by sending a crafted URL with a malicious post_id. Since it does not appear in the CISA KEV catalog, the current threat level is moderate but non-negligible. Exploitation requires only network access to the application and does not necessitate authentication.

Generated by OpenCVE AI on March 23, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch from SourceCodester for Simple E-learning System v1.0 that sanitizes the post_id parameter.
  • If no patch is available, restrict direct access to delete_post.php using web server rules such as IP whitelisting or disabling the endpoint temporarily.
  • Modify the code to cast post_id to an integer and bind it as a parameter in prepared SQL statements.
  • Enable application logging and monitor for suspicious DELETE or UPDATE queries involving the posts table.
  • Conduct a review of all input points in the application for similar SQL injection risks and remediate accordingly.

Generated by OpenCVE AI on March 23, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester simple E-learning System
Vendors & Products Sourcecodester
Sourcecodester simple E-learning System

Mon, 23 Mar 2026 05:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in SourceCodester Simple E-learning System 1.0. This affects an unknown part of the file /includes/form_handlers/delete_post.php of the component HTTP GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
Title SourceCodester Simple E-learning System HTTP GET Parameter delete_post.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Simple E-learning System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T13:57:21.182Z

Reserved: 2026-03-22T08:48:13.841Z

Link: CVE-2026-4573

cve-icon Vulnrichment

Updated: 2026-03-25T13:57:15.681Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T06:16:20.400

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4573

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:46Z

Weaknesses