Description
A flaw has been found in itsourcecode Construction Management System 1.0. The impacted element is an unknown function of the file /del1.php. This manipulation of the argument toolname causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-04-10
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch Now
AI Analysis

Impact

A flaw exists in itsourcecode Construction Management System version 1.0; a function inside the file del1.php accepts a toolname parameter that is not properly sanitized. Manipulating this argument allows an attacker to inject arbitrary SQL statements. The vulnerability is exploitable from a remote host, and an exploit has already been published for the public based on this flaw. The impact includes unauthorized data access, alteration, or deletion within the database, and potentially wider system compromise if the database has elevated privileges.

Affected Systems

All installations of itsourcecode Construction Management System 1.0 are vulnerable, as the flaw appears in the del1.php file of that release. No other versions are specified as affected, but any deployment using this file and accepting the toolname parameter is at risk until a patch or mitigation is applied.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate impact, yet the exploitation path is straightforward: send a crafted request to del1.php from a remote location, inject SQL, and read or modify data. The EPSS score is not available, but the existence of a published exploit suggests a realistic threat. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, yet the public nature of the exploit increases likelihood of real-world attacks.

Generated by OpenCVE AI on April 10, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's patch for Construction Management System 1.0 or upgrade to a newer, patched release if available.
  • If an immediate patch is not possible, restrict network access to the del1.php endpoint using firewall rules or web‑application firewall policies.
  • Implement input validation or use parameterized queries in the del1.php code to sanitize the toolname parameter.
  • Monitor database logs for abnormal queries or failed login attempts that may indicate exploitation attempts.

Generated by OpenCVE AI on April 10, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode construction Management System
Vendors & Products Itsourcecode
Itsourcecode construction Management System

Fri, 10 Apr 2026 07:00:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Construction Management System 1.0. The impacted element is an unknown function of the file /del1.php. This manipulation of the argument toolname causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title itsourcecode Construction Management System del1.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Construction Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T15:15:49.331Z

Reserved: 2026-04-09T16:06:46.151Z

Link: CVE-2026-6030

cve-icon Vulnrichment

Updated: 2026-04-10T15:15:43.149Z

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:22.207

Modified: 2026-04-10T07:16:22.207

Link: CVE-2026-6030

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:31Z

Weaknesses