Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3746: SQL Injection in SourceCodester Simple Responsive Tourism Website

0
Medium
VulnerabilityCVE-2026-3746cvecve-2026-3746
Published: Sun Mar 08 2026 (03/08/2026, 15:32:11 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Simple Responsive Tourism Website

Description

A vulnerability was determined in SourceCodester Simple Responsive Tourism Website 1.0. Affected by this vulnerability is an unknown functionality of the file /tourism/classes/Login.php?f=login of the component Login. This manipulation of the argument Username causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 03/08/2026, 16:06:58 UTC

Technical Analysis

CVE-2026-3746 identifies a SQL injection vulnerability in the SourceCodester Simple Responsive Tourism Website version 1.0, specifically within the Login.php script's login function. The vulnerability stems from inadequate input validation or sanitization of the 'Username' parameter, which is directly incorporated into SQL queries without proper escaping or parameterization. This allows an unauthenticated remote attacker to craft malicious input that alters the intended SQL command, potentially enabling unauthorized access to sensitive data, bypassing authentication, or modifying database contents. The vulnerability is exploitable over the network without any user interaction or privileges, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) indicates low attack complexity, no required authentication, and partial impact on confidentiality, integrity, and availability. Despite the public disclosure, no known exploits have been observed in the wild, and no official patches have been released by the vendor. This vulnerability highlights the critical need for secure coding practices, especially input validation and the use of prepared statements or parameterized queries in web applications handling user authentication.

Potential Impact

The exploitation of this SQL injection vulnerability can have severe consequences for organizations using the affected software. Attackers can remotely execute arbitrary SQL commands, leading to unauthorized disclosure of sensitive user data, including credentials and personal information. They may also alter or delete data, compromising data integrity and potentially disrupting service availability. In the context of a tourism website, this could result in exposure of customer booking details or financial information, damaging customer trust and causing regulatory compliance issues. Since the vulnerability requires no authentication and no user interaction, it can be exploited at scale by automated tools, increasing the risk of widespread compromise. Organizations may face reputational damage, financial losses, and legal liabilities if the vulnerability is exploited. The absence of a patch and public exploits means organizations must act proactively to mitigate risk.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and update the affected login code to implement proper input validation and sanitization. Specifically, the 'Username' parameter must be handled using parameterized queries or prepared statements to prevent SQL injection. Until an official patch is available, deploying a Web Application Firewall (WAF) with rules to detect and block SQL injection attempts targeting the login endpoint can reduce risk. Additionally, monitoring logs for suspicious login attempts and unusual database queries can help detect exploitation attempts early. If feasible, temporarily disabling the vulnerable login functionality or restricting access to trusted IP addresses can further reduce exposure. Organizations should also conduct a thorough security audit of their web applications to identify and remediate similar injection flaws. Finally, maintaining regular backups and an incident response plan will help mitigate damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:15:47.662Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ad9b4b2904315ca3c0f6ce

Added to database: 3/8/2026, 3:52:43 PM

Last enriched: 3/8/2026, 4:06:58 PM

Last updated: 3/9/2026, 5:59:17 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses