Impact
The vulnerability exists in an unspecified function of the Courier Management System's edit_staff.php file. Manipulating the ID argument can cause arbitrary SQL commands to be executed against the database. This can let an attacker read, modify, or delete data stored by the application. The flaw is a classic input validation weakness (CWE-74) combined with an injection flaw (CWE-89).
Affected Systems
itsourcecode Courier Management System version 1.0 is affected. Any deployment that includes the edit_staff.php endpoint and accepts an ID parameter without proper validation is vulnerable.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate severity. The EPSS score is not available, and the flaw is not listed in CISA's KEV catalog, so the current exploitation probability is unknown. However, the entry explicitly states that the exploit is publicly available and the attack can be launched remotely, indicating that an attacker can trigger the flaw from outside the network without additional access.
OpenCVE Enrichment