CVE-2026-3812
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the payroll management system, potentially compromising user data or session information. It can be exploited remotely by manipulating a specific part of the web application without needing special access or credentials.
Technical Description
A vulnerability was determined in itsourcecode Payroll Management System 1.0. Affected is an unknown function of the file /manage_employee_allowances.php. This manipulation of the argument ID causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 9, 2026
30 days ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
angeljudesuarez
Product
payroll management system
Related Vulnerabilities
An attacker can exploit a vulnerability in the university management system to manipulate a specific input, allowing them to execute unauthorized SQL commands and potentially access or modify the database remotely. This attack can be carried out without needing physical access to the system, making it a significant risk for any installation of this software.
This vulnerability allows an attacker to remotely manipulate the university management system's database by exploiting a flaw in a specific file, which can lead to unauthorized access to sensitive information. The attacker needs to send a specially crafted request to the system, and there are publicly available tools that can facilitate this exploit.
An attacker can remotely manipulate a specific part of the university management system to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability occurs when the system processes a certain input incorrectly, making it easy for attackers to exploit it if they know how to send the right request.
An attacker can exploit a vulnerability in the university management system to manipulate data in the database by sending specially crafted requests, allowing them to execute unauthorized SQL commands. This can be done remotely without needing to be logged in, and there are publicly available methods to carry out the attack.
This vulnerability allows an attacker to remotely manipulate the university management system's search function to execute unauthorized SQL commands, potentially exposing sensitive student data. The attack can be carried out without needing any special access, making it a significant risk for the system.