Description
A vulnerability was identified in itsourcecode Electronic Judging System 1.0. This affects an unknown part of the file /intrams/login.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Published: 2026-05-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability is an SQL injection flaw in the login.php page of itsourcecode's Electronic Judging System 1.0. By manipulating the Username parameter, an attacker can supply arbitrary SQL code that is executed by the backend database. The flaw can enable unauthorized disclosure, modification, or deletion of database content and may lead to privilege escalation, thereby compromising confidentiality, integrity, and availability of the system.

Affected Systems

Affected constructs include the Electronic Judging System produced by itsourcecode, specifically version 1.0, where the vulnerable code resides in the /intrams/login.php module. The vulnerability may affect any deployment of this version accessed publicly over the network.

Risk and Exploitability

The CVSS score of 6.9 indicates a high severity risk, while the lack of an EPSS score means the probability of exploitation is unknown but the publicly available exploit and remote attack vector raise concerns. The vulnerability is not currently listed in the CISA KEV catalog. An attacker who controls a remote attack vector could inject SQL statements through the Username field, potentially gaining unauthorized data access or altering system state. System owners should evaluate whether this component is exposed to the Internet, assess the potential exposure of sensitive data, and treat the risk as moderate‑to‑high under the current context.

Generated by OpenCVE AI on May 1, 2026 at 23:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy an official patch or upgrade the Electronic Judging System to a version where login.php has been fixed to use parameterized queries.
  • Implement strict input validation for the Username field, rejecting characters that are not permitted in normal usernames and escaping inputs before inclusion in SQL statements.
  • Restrict external access to the login page by applying network firewall rules, VPN, or IP whitelisting to limit connections to trusted administrative hosts.

Generated by OpenCVE AI on May 1, 2026 at 23:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Itsourcecode
Itsourcecode electronic Judging System
Vendors & Products Itsourcecode
Itsourcecode electronic Judging System

Fri, 01 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in itsourcecode Electronic Judging System 1.0. This affects an unknown part of the file /intrams/login.php. Such manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Title itsourcecode Electronic Judging System login.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Itsourcecode Electronic Judging System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-01T21:29:37.197Z

Reserved: 2026-04-30T19:11:05.680Z

Link: CVE-2026-7555

cve-icon Vulnrichment

Updated: 2026-05-01T21:29:33.642Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T06:16:32.670

Modified: 2026-05-01T15:26:24.553

Link: CVE-2026-7555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:00:14Z

Weaknesses