Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2984: Denial of Service in SourceCodester Student Result Management System

0
Medium
VulnerabilityCVE-2026-2984cvecve-2026-2984
Published: Mon Feb 23 2026 (02/23/2026, 10:02:10 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Student Result Management System

Description

A vulnerability was identified in SourceCodester Student Result Management System 1.0. This affects an unknown function of the file /admin/core/drop_user.php. Such manipulation of the argument ID leads to denial of service. The attack can be executed remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 02/23/2026, 10:32:36 UTC

Technical Analysis

CVE-2026-2984 identifies a denial of service vulnerability in SourceCodester Student Result Management System version 1.0, specifically within the /admin/core/drop_user.php script. The vulnerability arises from improper handling of the ID parameter, which an attacker can manipulate remotely to cause the system to crash or become unresponsive, effectively denying service to legitimate users. The attack vector requires no authentication or user interaction, making it easier to exploit. The vulnerability affects the availability of the system, potentially disrupting access to student result management functions. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates network attack vector, low attack complexity, no privileges or user interaction required, and partial impact on integrity and availability. Although no patches are currently linked, the presence of a public exploit increases the urgency for mitigation. The vulnerability does not affect confidentiality or system components beyond the application scope. The system is typically deployed in educational environments, making the impact focused on academic institutions relying on this software for managing student records.

Potential Impact

The primary impact of CVE-2026-2984 is the disruption of availability of the Student Result Management System, which can halt access to critical academic data such as student grades and records. This can affect administrative operations and delay academic processes. Since the exploit requires no authentication and can be executed remotely, attackers can easily launch denial of service attacks, potentially causing repeated outages. The vulnerability does not directly compromise confidentiality or integrity but the loss of availability can have operational and reputational consequences for educational institutions. Organizations relying on this system may face interruptions in service, impacting students, faculty, and administrative staff. The medium severity rating reflects the moderate impact and ease of exploitation, but the scope is limited to environments using this specific software version.

Mitigation Recommendations

To mitigate CVE-2026-2984, organizations should immediately implement strict input validation and sanitization on the ID parameter in /admin/core/drop_user.php to prevent malicious manipulation. Until an official patch is released, consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable endpoint. Restrict network access to the administrative interface by IP whitelisting or VPN enforcement to reduce exposure. Monitor logs for unusual activity related to the drop_user.php script to identify potential exploitation attempts. Educate system administrators about the vulnerability and ensure backups of critical data are maintained to facilitate recovery in case of service disruption. Once a vendor patch becomes available, prioritize timely application to fully remediate the issue. Additionally, consider isolating the affected system within the network to limit potential impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T16:42:17.819Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699c2930be58cf853b7275d9

Added to database: 2/23/2026, 10:17:20 AM

Last enriched: 2/23/2026, 10:32:36 AM

Last updated: 2/24/2026, 5:28:45 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats