Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sourcecodester
Sourcecodester simple E-learning System |
|
| Vendors & Products |
Sourcecodester
Sourcecodester simple E-learning System |
Mon, 23 Mar 2026 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in SourceCodester Simple E-learning System 1.0. This affects an unknown part of the file /includes/form_handlers/delete_post.php of the component HTTP GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. | |
| Title | SourceCodester Simple E-learning System HTTP GET Parameter delete_post.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-25T13:57:21.182Z
Reserved: 2026-03-22T08:48:13.841Z
Link: CVE-2026-4573
Updated: 2026-03-25T13:57:15.681Z
Status : Deferred
Published: 2026-03-23T06:16:20.400
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-4573
No data.
OpenCVE Enrichment
Updated: 2026-03-25T14:49:46Z