{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1593","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-29T08:32:36.564Z","datePublished":"2026-01-29T14:32:06.560Z","dateUpdated":"2026-02-23T09:04:46.191Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T09:04:46.191Z"},"title":"itsourcecode Society Management System edit_expenses_query.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"itsourcecode","product":"Society Management System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-04T03:53:45.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Shixu Wang (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.343355","name":"VDB-343355 | itsourcecode Society Management System edit_expenses_query.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.343355","name":"VDB-343355 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.740689","name":"Submit #740689 | itsourcecode Society Management System V1.0 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/yyzq-wsx/for_cve/issues/3","tags":["exploit","issue-tracking"]},{"url":"https://itsourcecode.com/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"references":[{"url":"https://github.com/yyzq-wsx/for_cve/issues/3","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-29T15:54:12.829890Z","id":"CVE-2026-1593","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-29T16:43:13.740Z"}}]}}