CVE-2026-3734
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to gain unauthorized access to sensitive manager details in the client database management system by manipulating a specific request sent to the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk for users of this software.
Technical Description
A flaw has been found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /fetch_manager_details.php of the component Endpoint. This manipulation of the argument manager_id causes improper authorization. The attack can be initiated remotely. The exploit has been published and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
lerouxyxchire
Product
client database management system
Related Vulnerabilities
This vulnerability allows an attacker to gain unauthorized access to the client database management system, potentially letting them modify user information without proper permissions. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and it has been publicly disclosed, making it easier for malicious actors to exploit it.
An attacker can gain unauthorized access to delete a manager from the client database management system by manipulating a specific ID in the system's code. This can be done remotely, meaning the attacker doesn't need to be on the same network as the target system.
An attacker can gain unauthorized access to delete user accounts in the SourceCodester Client Database Management System by manipulating the user_id parameter in a specific file, which can be done remotely. This vulnerability requires no special access, making it easier for attackers to exploit it.