Description
A vulnerability was identified in itsourcecode Online Enrollment System 1.0. This affects an unknown function of the file /sms/user/index.php?view=edit&id=10 of the component Parameter Handler. Such manipulation of the argument USERID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to data theft or modification
Action: Immediate Patch
AI Analysis

Impact

A flaw in itsourcecode Online Enrollment System allows a remote attacker to inject arbitrary SQL through the USERID parameter in the /sms/user/index.php?view=edit&id=10 URL. By manipulating this input, the attacker can execute commands against the database, enabling read, modify, or delete operations on enrollment records. This vulnerability is a classic SQL injection (CWE-89) and may also involve improper handling of URL arguments (CWE-74). The result is a breach of confidentiality, integrity, and potentially availability if the database is corrupted.

Affected Systems

The affected product is itsourcecode Online Enrollment System version 1.0. The vulnerability resides in a potentially unknown function within the Parameter Handler component of that product. No other versions or platforms are specified.

Risk and Exploitability

The CVSS score of 6.9 marks the vulnerability as medium‑high severity. Although no EPSS score is reported and the flaw is not listed in the CISA KEV catalog, the exploit is publicly available and can be performed remotely. Consequently, the likelihood of real‑world exploitation is significant, and the risk to sensitive enrollment data is high.

Generated by OpenCVE AI on April 5, 2026 at 05:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or upgrade to the latest version of the Online Enrollment System.
  • If a patch is not yet released, restrict or disable access to the /sms/user/index.php endpoint that accepts the USERID parameter.
  • Implement proper input validation and use parameterized database queries in the application code to block future SQL injection attempts.

Generated by OpenCVE AI on April 5, 2026 at 05:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode online Enrollment System
Vendors & Products Itsourcecode
Itsourcecode online Enrollment System
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode Online Enrollment System 1.0. This affects an unknown function of the file /sms/user/index.php?view=edit&id=10 of the component Parameter Handler. Such manipulation of the argument USERID leads to sql injection. The attack can be executed remotely. The exploit is publicly available and might be used.
Title itsourcecode Online Enrollment System Parameter index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Online Enrollment System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T19:12:16.281Z

Reserved: 2026-04-04T06:37:48.781Z

Link: CVE-2026-5534

cve-icon Vulnrichment

Updated: 2026-04-06T19:12:10.790Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T03:16:00.800

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5534

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:20Z

Weaknesses