Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2983: Improper Access Controls in SourceCodester Student Result Management System

0
Medium
VulnerabilityCVE-2026-2983cvecve-2026-2983
Published: Mon Feb 23 2026 (02/23/2026, 09:32:07 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Result Management System

Description

A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted element is an unknown function of the file /admin/core/import_users.php of the component Bulk Import. This manipulation of the argument File causes improper access controls. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 10:16:43 UTC

Technical Analysis

CVE-2026-2983 identifies an improper access control vulnerability in the SourceCodester Student Result Management System version 1.0, specifically within the Bulk Import feature implemented in the /admin/core/import_users.php file. The vulnerability arises from inadequate validation or enforcement of access permissions on a file argument, allowing remote attackers to manipulate this parameter to bypass intended access controls. This flaw does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability could enable attackers to import unauthorized user data or modify existing records, potentially compromising the confidentiality and integrity of student result data. The CVSS 4.0 vector indicates no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). Although no public exploits are currently observed in the wild, the public disclosure of the vulnerability increases the likelihood of exploitation attempts. The lack of patches or official fixes at the time of disclosure necessitates immediate defensive measures. The vulnerability affects only version 1.0 of the product, which is commonly used in educational institutions for managing student results and bulk user imports. This vulnerability highlights the risk of insufficient access control checks in web application components handling file inputs and bulk data operations.

Potential Impact

The vulnerability could allow unauthorized remote attackers to bypass access controls and manipulate user data within the Student Result Management System. This can lead to unauthorized creation, modification, or deletion of student records, undermining data integrity and confidentiality. Educational institutions relying on this system may face data breaches, loss of trust, and potential regulatory compliance issues related to student data protection. The availability impact is low but could increase if attackers disrupt the import process or corrupt data. Since the system manages sensitive academic records, exploitation could affect student evaluations, academic progress tracking, and administrative operations. The medium CVSS score reflects moderate risk, but the ease of remote exploitation without authentication raises concern for widespread abuse if left unmitigated. Organizations worldwide using this software, especially in education sectors, could experience operational disruptions and reputational damage.

Mitigation Recommendations

1. Immediately restrict access to the /admin/core/import_users.php endpoint to trusted administrators only, using network-level controls such as IP whitelisting or VPN access. 2. Implement strict server-side validation and sanitization of all file input parameters to prevent unauthorized file manipulation. 3. Apply role-based access controls (RBAC) ensuring only authorized users can perform bulk imports. 4. Monitor logs for unusual access patterns or repeated attempts to access the import functionality. 5. If possible, disable the bulk import feature until a vendor patch or official fix is released. 6. Conduct a thorough audit of user data integrity to detect any unauthorized changes. 7. Educate administrators about the vulnerability and encourage prompt reporting of suspicious activity. 8. Follow up with the vendor for patches or updates addressing this vulnerability and apply them as soon as available. 9. Consider deploying web application firewalls (WAFs) with custom rules to block exploit attempts targeting this endpoint.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T16:42:13.541Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c25a9be58cf853b6f8c78

Added to database: 2/23/2026, 10:02:17 AM

Last enriched: 2/23/2026, 10:16:43 AM

Last updated: 4/8/2026, 12:05:15 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses