Description
A flaw has been found in itsourcecode sanitize or validate this input 1.0. This impacts an unknown function of the file /borrowedequip.php of the component Parameter Handler. This manipulation of the argument emp_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch ASAP
AI Analysis

Impact

A flaw was discovered in the itsourcecode sanitize or validate this input 1.0 component that handles /borrowedequip.php. The flaw resides in the emp_id parameter, which can be manipulated to inject arbitrary SQL statements into the database query. Attackers able to supply malicious content can execute arbitrary SELECT, UPDATE, DELETE, or INSERT commands, potentially exposing sensitive data, altering inventory records, or disrupting operations. The vulnerability stems from improper input sanitization (CWE‑74) and improper neutralization of special elements used in an SQL command (CWE‑89).

Affected Systems

The affected product is itsourcecode sanitize or validate this input version 1.0, specifically the borrowedequip.php file within the Parameter Handler module. Administrators deploying this component should verify whether their installations include this vulnerable code. No vendor patch or specific affected version range is published, so users should check for updates or vendor advisories.

Risk and Exploitability

The CVSS v3.1 score of 5.3 indicates moderate severity, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. The attack is feasible remotely, as the vulnerability is triggered by manipulating a user-controllable parameter sent via HTTP. Published exploits suggest that attackers can already exploit the issue, raising the likelihood of real-world impact. Until a vendor fix is released, the risk remains moderate to high depending on the application's role in handling confidential data.

Generated by OpenCVE AI on April 7, 2026 at 02:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any vendor patches or updates for the itsourcecode sanitize or validate this input component.
  • Validate the emp_id parameter to accept only expected numeric values.
  • Refactor database interactions to use parameterized queries or stored procedures to eliminate direct concatenation of user input.
  • Limit the database user’s privileges to the minimum necessary for application operations.
  • Enable logging and monitoring for suspicious SQL activity and review logs regularly.

Generated by OpenCVE AI on April 7, 2026 at 02:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode sanitize Or Validate This Input
Vendors & Products Itsourcecode
Itsourcecode sanitize Or Validate This Input

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode sanitize or validate this input 1.0. This impacts an unknown function of the file /borrowedequip.php of the component Parameter Handler. This manipulation of the argument emp_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title itsourcecode sanitize or validate this input Parameter borrowedequip.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Sanitize Or Validate This Input
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T16:12:51.633Z

Reserved: 2026-04-06T09:52:04.455Z

Link: CVE-2026-5681

cve-icon Vulnrichment

Updated: 2026-04-07T16:12:48.211Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T20:16:28.997

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-5681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:30Z

Weaknesses