Description
A weakness has been identified in itsourcecode Online Enrollment System 1.0. This vulnerability affects unknown code of the file /sms/user/index.php?view=add of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Assess Impact
AI Analysis

Impact

A vulnerability in the Online Enrollment System allows attackers to inject arbitrary SQL by supplying a malicious value for the Name parameter in the page /sms/user/index.php?view=add. This flaw is a classic SQL injection that can grant an attacker unauthorized read or write access to the underlying database. The flaw is tied to the Parameter Handler component and is enumerated as CWE-74 (Improper Handling of Parameters) and CWE-89 (SQL Injection).

Affected Systems

The affected application is itsourcecode’s Online Enrollment System, version 1.0. No other versions are specifically listed as vulnerable.

Risk and Exploitability

The vulnerability scores a CVSS 6.9, indicating moderate severity. Its EPSS score is not available, but the flaw is publicly known and the exploit code has been made available online, suggesting that attackers could obtain it easily. It is not listed in the CISA KEV catalog, implying it has not yet been seen in large‑scale exploitation. The attack vector appears to be remote over the web, and successful exploitation would require only an authenticated or unauthenticated user to supply an injected payload via the Name field, potentially leading to data exposure or compromise of application integrity. Given the moderate score and public availability of the exploit, the risk to systems running this version is considered significant but not critical.

Generated by OpenCVE AI on March 24, 2026 at 05:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑provided patch or upgrade to a newer version of the Online Enrollment System once available.
  • If a patch is not available, modify the application to use parameterized queries or stored procedures to eliminate the injection point.
  • Restrict access to the /sms/user/index.php?view=add endpoint and enforce input validation or sanitization for the Name parameter.
  • Deploy a web‑application firewall rule that detects and blocks common SQL injection patterns.
  • Regularly monitor web logs for suspicious query strings and anomalous database activity.

Generated by OpenCVE AI on March 24, 2026 at 05:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode online Enrollment System
Vendors & Products Itsourcecode
Itsourcecode online Enrollment System

Tue, 24 Mar 2026 04:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in itsourcecode Online Enrollment System 1.0. This vulnerability affects unknown code of the file /sms/user/index.php?view=add of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title itsourcecode Online Enrollment System Parameter index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Online Enrollment System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T15:12:24.138Z

Reserved: 2026-03-23T08:30:50.539Z

Link: CVE-2026-4632

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-03-24T05:16:24.940

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-4632

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:40:11Z

Weaknesses