Description
A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-31
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Compromise
Action: Assess Impact
AI Analysis

Impact

A flaw in itsourcecode Payroll Management System 1.0 allows a remote attacker to manipulate the ID argument in the /manage_user.php script, resulting in SQL injection. By injecting malicious SQL through this parameter, an attacker can read or modify database contents, compromising the confidentiality and integrity of payroll data.

Affected Systems

Affected are instances of itsourcecode Payroll Management System version 1.0, specifically the Parameter Handler component in the manage_user.php file. The vulnerability is present in the component’s handling of the ID argument and is exploitable in all deployments of the product version mentioned.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate to high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but a public exploit has been released and remote exploitation is feasible. An attacker who succeeds gains uncontrolled access to the database, enabling data theft, modification, or destruction. No official patch is currently available, so the risk remains until mitigation is applied.

Generated by OpenCVE AI on April 1, 2026 at 06:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Validate and sanitize the ID input before use in any SQL query.
  • Restrict or temporarily disable the /manage_user.php endpoint to prevent exploitation while a fix is applied.
  • Apply a vendor update or patch as soon as one is released.
  • Monitor database logs and audit trails for abnormal activity indicative of exploitation.
  • Consider rotating database credentials to reduce impact if compromise occurs.

Generated by OpenCVE AI on April 1, 2026 at 06:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
Title itsourcecode Payroll Management System Parameter manage_user.php sql injection
First Time appeared Itsourcecode
Itsourcecode payroll Management System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:itsourcecode:payroll_management_system:*:*:*:*:*:*:*:*
Vendors & Products Itsourcecode
Itsourcecode payroll Management System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Payroll Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T13:21:33.845Z

Reserved: 2026-03-31T14:14:36.810Z

Link: CVE-2026-5237

cve-icon Vulnrichment

Updated: 2026-04-01T13:21:28.370Z

cve-icon NVD

Status : Deferred

Published: 2026-03-31T23:17:11.627

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5237

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:09:57Z

Weaknesses