Description
A vulnerability was detected in SourceCodester/jkev Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument Username results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

A flaw in the login module of the SourceCodester and jkev Record Management System allows an attacker to craft a Username input that contains malicious SQL, causing the application to execute unintended database commands. Classified as CWE‑74 and CWE‑89, the vulnerability leads to the acquisition of, modification of, or removal of data stored in the database, thereby exposing confidentiality and integrity of sensitive information. The exploit is publicly available and can be triggered remotely via the login page.

Affected Systems

The records management systems developed by SourceCodester and jkev are impacted. The CVE entry does not specify a particular version, so any deployment that has not applied the relevant fix or mitigation could be vulnerable.

Risk and Exploitability

The base CVSS score of 6.9 places the flaw in the medium severity range. With no EPSS score provided and no listing in the CISA KEV catalog, the exact probability of exploitation is uncertain. Nevertheless, the remote attack vector and the existence of a public exploit indicate that an adversary can realistically acquire a foothold to compromise data if the vulnerability remains unmitigated.

Generated by OpenCVE AI on April 5, 2026 at 19:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether an updated release of the Record Management System is available and apply the patch or upgrade immediately.
  • If a patch is not available, enforce strict server‑side validation on the Username field, rejecting disallowed characters and using parameterized queries or prepared statements.
  • Deploy a web application firewall tuned to detect and block typical SQL injection patterns on the login endpoint.
  • Conduct regular security scans and monitor logs for suspicious activity affecting the login module.
  • Limit the database permissions granted to the application user to reduce the impact of potential injection.
  • Keep the application and underlying database engine patched against known security issues.

Generated by OpenCVE AI on April 5, 2026 at 19:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Jkev
Jkev record Management System
Sourcecodester
Sourcecodester record Management System
Vendors & Products Jkev
Jkev record Management System
Sourcecodester
Sourcecodester record Management System

Sun, 05 Apr 2026 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in SourceCodester/jkev Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument Username results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.
Title SourceCodester/jkev Record Management System Login index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Jkev Record Management System
Sourcecodester Record Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T02:53:41.221Z

Reserved: 2026-04-04T14:45:18.204Z

Link: CVE-2026-5575

cve-icon Vulnrichment

Updated: 2026-04-07T02:53:37.453Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T15:16:43.010

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5575

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:36Z

Weaknesses