Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3152: SQL Injection in itsourcecode College Management System

0
Medium
VulnerabilityCVE-2026-3152cvecve-2026-3152
Published: Wed Feb 25 2026 (02/25/2026, 05:02:11 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: College Management System

Description

A flaw has been found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/teacher-salary.php. This manipulation of the argument teacher_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 02/25/2026, 05:40:49 UTC

Technical Analysis

The vulnerability identified as CVE-2026-3152 affects the itsourcecode College Management System version 1.0. It is a classic SQL injection flaw located in the /admin/teacher-salary.php script, where the teacher_id parameter is not properly sanitized or validated before being incorporated into SQL queries. This lack of input validation allows an attacker to craft malicious SQL statements that the backend database executes, potentially exposing sensitive information or enabling unauthorized data manipulation. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, which significantly increases its attack surface. The CVSS 4.0 vector indicates that the attack complexity is low, no privileges or user interaction are needed, and the impact on confidentiality, integrity, and availability is low to medium. While no active exploits have been reported in the wild, the existence of a published exploit proof-of-concept means attackers could weaponize this vulnerability quickly. The affected product is primarily used in educational institutions for managing teacher salary data, making the confidentiality of payroll and personnel information a critical concern. The absence of official patches or mitigations at the time of disclosure further elevates the risk for organizations relying on this system.

Potential Impact

Successful exploitation of this SQL injection vulnerability can lead to unauthorized disclosure of sensitive payroll and personnel data, including teacher salaries and potentially other confidential information stored in the database. Attackers may also modify or delete records, disrupting administrative operations and causing data integrity issues. In worst-case scenarios, attackers could escalate their access within the system or pivot to other internal resources if the database contains credentials or other sensitive configuration data. For educational institutions, this could result in reputational damage, regulatory non-compliance (especially regarding data privacy laws), and financial losses. The remote and unauthenticated nature of the exploit increases the likelihood of automated scanning and exploitation attempts, potentially affecting a wide range of organizations using this software. The medium severity rating reflects the balance between the ease of exploitation and the limited scope of impact compared to more critical vulnerabilities.

Mitigation Recommendations

Organizations should immediately review and restrict access to the /admin/teacher-salary.php endpoint, ideally limiting it to trusted internal networks or VPN users. Input validation and parameterized queries or prepared statements must be implemented to sanitize the teacher_id parameter and prevent SQL injection. If the vendor has not released a patch, administrators should consider deploying Web Application Firewalls (WAFs) with specific rules to detect and block SQL injection attempts targeting this endpoint. Regularly monitoring logs for suspicious query patterns or repeated access attempts to the vulnerable script can help identify exploitation attempts early. Additionally, organizations should conduct a thorough audit of database permissions to ensure the application uses the least privilege principle, limiting the potential damage from a successful injection. Backup procedures should be verified and tested to enable rapid recovery in case of data tampering or loss. Finally, organizations should stay alert for vendor updates or community patches addressing this vulnerability and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-24T20:08:15.161Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e8808b7ef31ef0bd9ce55

Added to database: 2/25/2026, 5:26:32 AM

Last enriched: 2/25/2026, 5:40:49 AM

Last updated: 2/26/2026, 6:37:47 AM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats