Description
A weakness has been identified in itsourcecode Payroll Management System 1.0. Affected by this issue is some unknown functionality of the file /view_employee.php of the component Parameter Handler. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-31
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch Immediately
AI Analysis

Impact

The Payroll Management System 1.0 contains a code flaw in the /view_employee.php component’s Parameter Handler, where an attacker can manipulate the ID argument to inject malicious SQL. This flaw allows arbitrary SQL queries to be executed against the underlying database. The vulnerability is directly tied to improper handling of input and is exposed through the publicly accessible employee viewing interface.

Affected Systems

The affected product is itsourcecode Payroll Management System, version 1.0. The exploit originates from the view_employee.php file and is limited to this version, as no other versions are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. The exploit is publicly documented, and the attack vector is remote, as the payload can be sent via standard HTTP requests to the application. EPSS data is unavailable and the vulnerability is not included in the CISA KEV catalog. Because the flaw is reachable over the network, an attacker could potentially gain unauthorized access to database queries, increasing the risk of data exposure or manipulation if not mitigated.

Generated by OpenCVE AI on April 1, 2026 at 06:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply vendor patch or newer release that fixes the SQL injection flaw, if available.
  • If no patch, modify the ID handling in view_employee.php to validate and sanitize the input, preferably using prepared statements or proper escaping.
  • Restrict access to /view_employee.php so that only authenticated users with minimal privileges can reach it.
  • Deploy a web application firewall or intrusion detection system configured to detect and block SQL injection patterns targeting the application.
  • Monitor application and database logs for anomalous query activity and investigate any suspicious events promptly.

Generated by OpenCVE AI on April 1, 2026 at 06:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in itsourcecode Payroll Management System 1.0. Affected by this issue is some unknown functionality of the file /view_employee.php of the component Parameter Handler. Executing a manipulation of the argument ID can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title itsourcecode Payroll Management System Parameter view_employee.php sql injection
First Time appeared Itsourcecode
Itsourcecode payroll Management System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:itsourcecode:payroll_management_system:*:*:*:*:*:*:*:*
Vendors & Products Itsourcecode
Itsourcecode payroll Management System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Payroll Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T15:52:15.064Z

Reserved: 2026-03-31T14:14:40.980Z

Link: CVE-2026-5238

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-04-01T00:16:02.087

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:09:56Z

Weaknesses