CVE-2026-1593

A weakness has been identified in itsourcecode Society Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/edit_expenses_query.php. Executing a manipulation of the argument detail can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/yyzq-wsx/for_cve/issues/3 Exploit Issue Tracking Mitigation Third Party Advisory
https://itsourcecode.com/ Product
https://vuldb.com/?ctiid.343355 Permissions Required VDB Entry
https://vuldb.com/?id.343355 Third Party Advisory VDB Entry
https://vuldb.com/?submit.740689 Third Party Advisory VDB Entry
https://github.com/yyzq-wsx/for_cve/issues/3 Exploit Issue Tracking Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:angeljudesuarez:society_management_system:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-01-29 15:16

Updated : 2026-02-02 20:54


NVD link : CVE-2026-1593

Mitre link : CVE-2026-1593

CVE.ORG link : CVE-2026-1593


JSON object : View

Products Affected

angeljudesuarez

  • society_management_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')