Description
A vulnerability was determined in itsourcecode Courier Management System 1.0. Impacted is an unknown function of the file /edit_branch.php. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection that can expose or modify data
Action: Patch
AI Analysis

Impact

Affected is an unknown function in the file /edit_branch.php of itsourcecode Courier Management System. The application fails to validate the ID argument, permitting an attacker to inject SQL statements. The flaw is a classic SQL injection, classified under CWE-74 and CWE-89. Attackers can execute arbitrary queries remotely because the input is used directly in a database query.

Affected Systems

Only the 1.0 release of the Courier Management System is reported as vulnerable. No other versions are listed, so any installations running 1.0 will be impacted. If newer releases exist, users should verify whether the edit_branch.php vulnerability has been addressed.

Risk and Exploitability

The official CVSS score of 6.9 indicates a moderate severity. The EPSS score of < 1% suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. According to the description, the attack can be carried out remotely by supplying a malformed ID value to the edit_branch.php endpoint. It is inferred that the endpoint is reachable without user authentication, implying that any actor who can reach the web interface could trigger the injection. If successful, the attacker could read, modify, or delete data in the underlying database.

Generated by OpenCVE AI on April 28, 2026 at 04:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of Courier Management System or any vendor patch that addresses the edit_branch.php SQL injection.
  • Validate the ID input to allow only numeric characters and reject any unexpected input before it reaches the database.
  • Rewrite the database query to use parameterized statements or prepared statements instead of concatenating user input.

Generated by OpenCVE AI on April 28, 2026 at 04:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode courier Management System
Vendors & Products Itsourcecode
Itsourcecode courier Management System

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 02:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in itsourcecode Courier Management System 1.0. Impacted is an unknown function of the file /edit_branch.php. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
Title itsourcecode Courier Management System edit_branch.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Courier Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T16:36:57.069Z

Reserved: 2026-04-26T07:56:14.795Z

Link: CVE-2026-7076

cve-icon Vulnrichment

Updated: 2026-04-27T16:36:43.551Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T02:16:01.653

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7076

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T05:00:14Z

Weaknesses