VYPR
Medium severity6.3NVD Advisory· Published Mar 23, 2026· Updated Apr 29, 2026

CVE-2026-4573

CVE-2026-4573

Description

A security vulnerability has been detected in SourceCodester Simple E-learning System 1.0. This affects an unknown part of the file /includes/form_handlers/delete_post.php of the component HTTP GET Parameter Handler. The manipulation of the argument post_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Simple E-learning System 1.0 suffers from a time-based blind SQL injection in the delete_post.php endpoint via the post_id GET parameter, allowing authenticated attackers to exfiltrate database data.

The vulnerability is a time-based blind SQL injection in SourceCodester Simple E-learning System version 1.0. The flaw resides in the /includes/form_handlers/delete_post.php file, where the post_id parameter from GET requests is directly concatenated into SQL queries without proper sanitization. This allows an attacker to inject malicious SQL payloads, particularly SLEEP() statements, to infer data by observing response delays.

Exploitation requires authentication to the application. An attacker must have valid credentials (e.g., a teacher account) and access to the delete post functionality. The parameter post_id is passed via GET request, and tools like sqlmap can automate the extraction of data. The provided proof-of-concept demonstrates a time-based blind injection using a payload that triggers a 5-second sleep when the condition is true.

Successful exploitation enables an authenticated attacker to retrieve arbitrary data from the database, including user credentials, session tokens, or other sensitive information. The attack is remote and does not require any special privileges beyond basic user access.

As of the advisory, no patch has been released. Users should limit access to the application, apply input validation, or use parameterized queries to mitigate the risk. The exploit has been publicly disclosed [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.