VYPR
High severity7.2NVD Advisory· Published Apr 16, 2026· Updated Apr 18, 2026

CVE-2026-37341

CVE-2026-37341

Description

SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL Injection in the file /parking/manage_category.php.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Vehicle Parking Area Management System v1.0 is vulnerable to SQL injection via the `id` parameter in `/parking/manage_category.php`, allowing unauthenticated data extraction.

Vulnerability

Overview

CVE-2026-37341 describes a SQL injection vulnerability in SourceCodester Vehicle Parking Area Management System v1.0. The flaw resides in the /parking/manage_category.php script, where the id parameter is directly concatenated into SQL queries without proper sanitization or parameterization. This allows an attacker to inject arbitrary SQL commands, as demonstrated by the payload 0 union select 1,database(),3--+ which retrieves the database name [1].

Exploitation

Details

The vulnerability is exploitable via a simple GET request to /parking/manage_category.php?id=<payload>. No authentication is required, as the provided proof-of-concept uses a session cookie from a default admin account (admin/admin123), but the injection itself does not depend on prior authentication. The attacker only needs network access to the vulnerable endpoint. The injection point is the id parameter, and the database name parking_db is leaked in the response [1].

Impact

Successful exploitation allows an attacker to extract sensitive data from the underlying MySQL database, including user credentials, parking records, and other application data. The attacker can also potentially modify or delete data, escalate privileges, or gain further access to the server, depending on database permissions. The CVSS v3 score of 7.2 (High) reflects the ease of exploitation and the potential for significant data compromise.

Mitigation

As of the publication date (2026-04-16), no official patch has been released by SourceCodester. Users are advised to apply input validation and parameterized queries to the affected file, or to restrict access to the /parking/ directory until a vendor update is available. The vulnerability has been publicly disclosed with a working exploit, increasing the risk of active exploitation.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.