CVE-2026-3762
Plain English Summary
AI-powered analysis for quick understanding
An attacker can gain unauthorized access to delete a manager from the client database management system by manipulating a specific ID in the system's code. This can be done remotely, meaning the attacker doesn't need to be on the same network as the target system.
Technical Description
A vulnerability has been found in SourceCodester Client Database Management System 1.0/3.1. Impacted is an unknown function of the file /superadmin_delete_manager.php of the component Endpoint. The manipulation of the argument manager_id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
lerouxyxchire
Product
client database management system
Related Vulnerabilities
This vulnerability allows an attacker to gain unauthorized access to the client database management system, potentially letting them modify user information without proper permissions. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and it has been publicly disclosed, making it easier for malicious actors to exploit it.
An attacker can gain unauthorized access to delete user accounts in the SourceCodester Client Database Management System by manipulating the user_id parameter in a specific file, which can be done remotely. This vulnerability requires no special access, making it easier for attackers to exploit it.
This vulnerability allows an attacker to gain unauthorized access to sensitive manager details in the client database management system by manipulating a specific request sent to the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk for users of this software.