CVE-2026-3764
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to gain unauthorized access to the client database management system, potentially letting them modify user information without proper permissions. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, and it has been publicly disclosed, making it easier for malicious actors to exploit it.
Technical Description
A vulnerability was determined in SourceCodester Client Database Management System 1.0. The impacted element is an unknown function of the file /superadmin_user_update.php. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
30 days ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
lerouxyxchire
Product
client database management system
Related Vulnerabilities
An attacker can gain unauthorized access to delete a manager from the client database management system by manipulating a specific ID in the system's code. This can be done remotely, meaning the attacker doesn't need to be on the same network as the target system.
An attacker can gain unauthorized access to delete user accounts in the SourceCodester Client Database Management System by manipulating the user_id parameter in a specific file, which can be done remotely. This vulnerability requires no special access, making it easier for attackers to exploit it.
This vulnerability allows an attacker to gain unauthorized access to sensitive manager details in the client database management system by manipulating a specific request sent to the server. The attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk for users of this software.