Description
A vulnerability was detected in SourceCodester Simple E-learning System 1.0. This vulnerability affects unknown code of the component User Profile Update Handler. The manipulation of the argument firstName results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-03-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential remote SQL injection leading to unauthorized database access or alteration
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a SQL injection flaw in the User Profile Update Handler of SourceCodester Simple E-learning System 1.0, triggered by manipulating the firstName field. This flaw can enable a remote attacker to inject arbitrary SQL statements into database queries, potentially reading, modifying, or deleting sensitive data. The weakness corresponds to CWE-74 and CWE-89.

Affected Systems

Affected systems include SourceCodester Simple E-learning System version 1.0, deployed by institutions or individuals hosting the platform. The vulnerability resides in the user profile update function and is not limited to a specific operating environment; any installation that uses the default code base is susceptible

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity; the lack of an EPSS score or KEV listing suggests limited data but the exploit is publicly available. Attackers can reach the vulnerable endpoint remotely through the web interface by sending crafted firstName values. Because the flaw is an injection point in user-supplied data, no local privileges or complex setup are required. The public nature of the exploit means that organizations should assess exposure promptly.

Generated by OpenCVE AI on March 23, 2026 at 06:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy a vendor patch or upgrade to a fixed version of the Simple E-learning System when released
  • Apply input sanitization to the "firstName" parameter, ensuring that only allowed characters are accepted
  • Refactor the database interaction to use parameterized queries or prepared statements instead of string concatenation
  • Disable verbose database error messages that could aid an attacker
  • Monitor application logs for anomalous SQL activity and apply web application firewall rules to block suspicious input patterns

Generated by OpenCVE AI on March 23, 2026 at 06:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester simple E-learning System
Vendors & Products Sourcecodester
Sourcecodester simple E-learning System

Mon, 23 Mar 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in SourceCodester Simple E-learning System 1.0. This vulnerability affects unknown code of the component User Profile Update Handler. The manipulation of the argument firstName results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title SourceCodester Simple E-learning System User Profile Update sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Simple E-learning System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T13:56:16.529Z

Reserved: 2026-03-22T08:48:17.832Z

Link: CVE-2026-4574

cve-icon Vulnrichment

Updated: 2026-03-23T13:56:13.120Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T06:16:20.657

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:45Z

Weaknesses