VYPR
Medium severity6.3NVD Advisory· Published Apr 5, 2026· Updated Apr 29, 2026

CVE-2026-5553

CVE-2026-5553

Description

A vulnerability was identified in itsourcecode Online Cellphone System 1.0. Affected by this vulnerability is an unknown functionality of the file /cp/available.php of the component Parameter Handler. Such manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

itsourcecode Online Cellphone System 1.0 is vulnerable to SQL injection in /cp/available.php via the Name parameter, allowing unauthenticated remote attackers to compromise the database.

Vulnerability

Overview

A SQL injection vulnerability exists in itsourcecode Online Cellphone System version 1.0, specifically in the /cp/available.php file. The root cause is insufficient validation of the Name parameter, which is passed via multipart POST data. User-supplied input is directly concatenated into SQL queries without proper sanitization or parameterization, allowing an attacker to inject arbitrary SQL commands [1].

Exploitation

The attack can be launched remotely without requiring any authentication or prior authorization. The parameter MULTIPART name ((custom) POST) is the injection point is exploitable using techniques such as boolean-based blind SQL injection. A proof-of-concept payload has been publicly disclosed, lowering the barrier for exploitation [1].

Impact

Successful exploitation enables an attacker to gain unauthorized access to the underlying database. This can lead to sensitive data leakage, data modification or deletion, and potentially full system compromise. The impact extends to business continuity, as the attacker may disrupt services or manipulate critical information [1].

Mitigation

As of the publication date, no official patch has been released by the vendor. The project is available from itsourcecode.com [2]. Users should apply input validation and use prepared statements with parameterized queries to remediate the vulnerability. Given the public availability of exploit details, immediate action is recommended.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.