Description
A flaw has been found in itsourcecode Construction Management System 1.0. This affects an unknown part of the file /execute.php. This manipulation of the argument code causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Published: 2026-04-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection allowing unauthorized data access or modification
Action: Patch
AI Analysis

Impact

The affected file execute.php processes a parameter named code, which is used directly in SQL queries. This omission of proper input validation enables a malicious user to inject arbitrary SQL statements. The result is remote SQL injection that can lead to unauthorized disclosure, modification, or deletion of database contents, compromising confidentiality, integrity, and possibly availability of the system. The weakness matches CWE-74 and CWE-89.

Affected Systems

The vulnerability exists in itsourcecode Construction Management System version 1.0. The impacted component resides in an unknown portion of execute.php. Only the vendor itsourcecode and product Construction Management System are listed as affected; no further version details are provided beyond 1.0.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity for remote exploitation. The EPSS score is less than 1%, suggesting that the probability of exploitation in the wild is low, and the vulnerability is not included in the CISA KEV catalog. Nevertheless, because the flaw is exploitable remotely and published exploits have been released, attackers can potentially craft HTTP requests targeting the code parameter. Successful exploitation would grant the attacker the ability to execute arbitrary SQL, leading to data compromise or manipulation.

Generated by OpenCVE AI on April 28, 2026 at 04:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official patch or upgrade to a newer release of itsourcecode Construction Management System that addresses the SQL injection flaw.
  • If a patch is not yet available, restrict access to the /execute.php endpoint through network ACLs, IP whitelisting, or internal routing configured to limit exposure.
  • Review and refactor the code handling the code parameter to use parameterized queries or prepared statements, thereby preventing unsafe SQL construction as highlighted by CWE-89.
  • Stay informed by regularly monitoring the vendor's advisories and security bulletins for updated fixes.

Generated by OpenCVE AI on April 28, 2026 at 04:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode construction Management System
Vendors & Products Itsourcecode
Itsourcecode construction Management System

Mon, 27 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in itsourcecode Construction Management System 1.0. This affects an unknown part of the file /execute.php. This manipulation of the argument code causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.
Title itsourcecode Construction Management System execute.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Construction Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T13:02:07.296Z

Reserved: 2026-04-26T07:54:13.327Z

Link: CVE-2026-7073

cve-icon Vulnrichment

Updated: 2026-04-27T13:02:02.237Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T01:16:16.310

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7073

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses