CVE-2026-3761
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain unauthorized access to delete user accounts in the SourceCodester Client Database Management System by manipulating the user_id parameter in a specific file, which can be done remotely. This vulnerability requires no special access, making it easier for attackers to exploit it.
Technical Description
A flaw has been found in SourceCodester Client Database Management System 1.0. This issue affects some unknown processing of the file /superadmin_user_delete.php of the component Endpoint. Executing a manipulation of the argument user_id can lead to improper authorization. The attack may be performed from remote. The exploit has been published and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
lerouxyxchire
Product
client database management system
Related Vulnerabilities
This vulnerability allows an attacker to gain unauthorized access to the client database management system, potentially letting them modify user information without proper permissions. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and it has been publicly disclosed, making it easier for malicious actors to exploit it.
An attacker can gain unauthorized access to delete a manager from the client database management system by manipulating a specific ID in the system's code. This can be done remotely, meaning the attacker doesn't need to be on the same network as the target system.
This vulnerability allows an attacker to gain unauthorized access to sensitive manager details in the client database management system by manipulating a specific request sent to the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk for users of this software.