CVE-2026-5553
Description
A vulnerability was identified in itsourcecode Online Cellphone System 1.0. Affected by this vulnerability is an unknown functionality of the file /cp/available.php of the component Parameter Handler. Such manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
itsourcecode Online Cellphone System 1.0 is vulnerable to SQL injection in /cp/available.php via the Name parameter, allowing unauthenticated remote attackers to compromise the database.
Vulnerability
Overview
A SQL injection vulnerability exists in itsourcecode Online Cellphone System version 1.0, specifically in the /cp/available.php file. The root cause is insufficient validation of the Name parameter, which is passed via multipart POST data. User-supplied input is directly concatenated into SQL queries without proper sanitization or parameterization, allowing an attacker to inject arbitrary SQL commands [1].
Exploitation
The attack can be launched remotely without requiring any authentication or prior authorization. The parameter MULTIPART name ((custom) POST) is the injection point is exploitable using techniques such as boolean-based blind SQL injection. A proof-of-concept payload has been publicly disclosed, lowering the barrier for exploitation [1].
Impact
Successful exploitation enables an attacker to gain unauthorized access to the underlying database. This can lead to sensitive data leakage, data modification or deletion, and potentially full system compromise. The impact extends to business continuity, as the attacker may disrupt services or manipulate critical information [1].
Mitigation
As of the publication date, no official patch has been released by the vendor. The project is available from itsourcecode.com [2]. Users should apply input validation and use prepared statements with parameterized queries to remediate the vulnerability. Given the public availability of exploit details, immediate action is recommended.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.