Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3153: SQL Injection in itsourcecode Document Management System

0
Medium
VulnerabilityCVE-2026-3153cvecve-2026-3153
Published: Wed Feb 25 2026 (02/25/2026, 05:32:08 UTC)
Source: CVE Database V5
Vendor/Project: itsourcecode
Product: Document Management System

Description

CVE-2026-3153 is a SQL injection vulnerability found in itsourcecode Document Management System version 1. 0, specifically in the /register. php file via the Username parameter. This vulnerability allows remote attackers to manipulate SQL queries without authentication or user interaction, potentially leading to partial compromise of confidentiality, integrity, and availability of the system. The vulnerability has a CVSS 4. 0 base score of 6. 9, indicating medium severity. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. Organizations using this product should prioritize patching or mitigating this vulnerability to prevent unauthorized data access or manipulation. The threat primarily affects deployments of this specific document management system, which may be more prevalent in countries with higher adoption of this software.

AI-Powered Analysis

AILast updated: 02/25/2026, 06:11:02 UTC

Technical Analysis

CVE-2026-3153 is a medium-severity SQL injection vulnerability identified in the itsourcecode Document Management System version 1.0. The flaw exists in the /register.php file, where the Username parameter is improperly sanitized, allowing an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. This injection can manipulate backend SQL queries, potentially enabling unauthorized access to sensitive data, modification of database contents, or disruption of service. The vulnerability affects confidentiality, integrity, and availability to a limited extent, as indicated by the CVSS vector (VC:L, VI:L, VA:L). The attack complexity is low, and no privileges or user interaction are needed, making exploitation feasible for remote attackers. Although no known exploits are currently active in the wild, the public disclosure of the vulnerability details increases the risk of exploitation. The vulnerability is specific to version 1.0 of the product, and no patches or updates have been linked yet, emphasizing the need for immediate mitigation steps by users of this software.

Potential Impact

The impact of CVE-2026-3153 on organizations using the itsourcecode Document Management System 1.0 can be significant. Successful exploitation could lead to unauthorized disclosure of sensitive documents or user data stored within the system, undermining confidentiality. Attackers may also alter or delete records, affecting data integrity and potentially disrupting business operations. Availability could be impacted if attackers execute SQL commands that degrade database performance or cause crashes. Given the remote and unauthenticated nature of the vulnerability, attackers can exploit it at scale, increasing the risk of widespread compromise in environments where this software is deployed. Organizations handling sensitive or regulated information are particularly at risk, as data breaches could lead to compliance violations, reputational damage, and financial losses.

Mitigation Recommendations

To mitigate CVE-2026-3153, organizations should immediately implement input validation and sanitization on the Username parameter in /register.php to prevent SQL injection. Employing parameterized queries or prepared statements is critical to ensure that user input cannot alter SQL command structure. If a patch or updated version from itsourcecode becomes available, prioritize applying it promptly. In the absence of a patch, consider deploying web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Regularly monitor logs for suspicious activity related to /register.php and the Username parameter. Additionally, conduct security assessments and code reviews of the application to identify and remediate other potential injection points. Restrict database user privileges to the minimum necessary to limit the impact of any successful injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-24T20:14:55.479Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e8f0fb7ef31ef0bdc614e

Added to database: 2/25/2026, 5:56:31 AM

Last enriched: 2/25/2026, 6:11:02 AM

Last updated: 2/25/2026, 8:12:11 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats