Description
A vulnerability was determined in itsourcecode sanitize or validate this input 1.0. This issue affects some unknown processing of the file /admin/subjects.php of the component Parameter Handler. This manipulation of the argument subject_code causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-03-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A SQL injection flaw has been found in itsourcecode’s Parameter Handler component, specifically through manipulation of the subject_code argument in the /admin/subjects.php page. An attacker who can supply a crafted subject_code value can cause arbitrary SQL statements to be executed on the underlying database. This vulnerability would allow an attacker to read, modify or delete data, thereby compromising confidentiality, integrity and availability of the application’s data.

Affected Systems

The issue targets the itsourcecode sanitize or validate this input product, version 1.0. The affected component processes a file located at /admin/subjects.php. Versions of the product other than 1.0 have not been confirmed as affected, but the vulnerability may exist in any build that contains the same Parameter Handler implementation.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the vulnerability is exploitable remotely over the internet. No EPSS score is available and it is not listed in CISA’s KEV catalog, suggesting that it is not currently a widely detected exploit. Nevertheless, the public disclosure and the fact that the attack vector is remote make it a notable risk for systems lacking a patch or mitigations.

Generated by OpenCVE AI on March 24, 2026 at 03:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade to a version that addresses the SQL injection issue.
  • If a patch is not yet available, limit administrative access to /admin/subjects.php by implementing IP whitelisting or network segmentation.
  • Use input validation or parameterized queries to sanitize the subject_code argument before it reaches the database layer.
  • Monitor web server and database logs for suspicious activity, such as unexpected SQL errors or unusual query patterns.

Generated by OpenCVE AI on March 24, 2026 at 03:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode sanitize Or Validate This Input
Vendors & Products Itsourcecode
Itsourcecode sanitize Or Validate This Input

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode sanitize or validate this input 1.0. This issue affects some unknown processing of the file /admin/subjects.php of the component Parameter Handler. This manipulation of the argument subject_code causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode sanitize or validate this input Parameter subjects.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Sanitize Or Validate This Input
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T18:40:54.782Z

Reserved: 2026-03-23T05:50:35.171Z

Link: CVE-2026-4614

cve-icon Vulnrichment

Updated: 2026-03-24T18:40:51.404Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T00:16:31.810

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-4614

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:35:56Z

Weaknesses