itsourcecode Electronic Judging System login.php sql injection
Description
A vulnerability has been found in itsourcecode Electronic Judging System 1.0. This affects an unknown part of the file /intrams/admin/login.php. The manipulation of the argument Username leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An SQL injection vulnerability exists in the Electronic Judging System 1.0 login page, allowing remote unauthenticated attackers to manipulate queries via the username parameter.
Vulnerability
A SQL injection vulnerability exists in the Electronic Judging System version 1.0, specifically in the /intrams/admin/login.php file. The issue arises because the Username parameter is directly concatenated into SQL queries without proper sanitization or validation [2]. This allows an attacker to inject arbitrary SQL commands through the login form. The software vendor homepage and affected zip file are available at the itsourcecode.com domain [1][2].
Exploitation
An attacker can exploit this vulnerability remotely without requiring authentication or any special privileges [2]. The attack is performed by sending a crafted POST request to the login endpoint with a malicious payload in the username parameter. A proof-of-concept payload example is: username=12345' AND (SELECT 4355 FROM (SELECT(SLEEP(5)))iVdz) AND 'WAPG'='WAPG&password=12345, which demonstrates time-based blind SQL injection [2]. The exploit has been publicly disclosed and may be used by attackers [CVE description].
Impact
Successful exploitation enables an attacker to perform unauthorized operations on the database, including accessing sensitive data, modifying or deleting records, and potentially gaining complete control of the system. This can lead to data leakage, data tampering, and service disruption, posing a serious threat to the confidentiality, integrity, and availability of the application and its data [2].
Mitigation
As of the publication date, no official patch or fixed version has been released by itsourcecode for the Electronic Judging System 1.0 [1][2]. The vendor has not provided a security update or workaround. Users should consider removing the vulnerable component from production environments or implementing Web Application Firewall (WAF) rules to block SQL injection patterns until a patch is made available. The software is available via a zip file from the vendor's site, and users should monitor itsourcecode.com for any future updates [1].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/nidieaaa/test/issues/11mitreexploitissue-tracking
- vuldb.com/submit/813427mitrethird-party-advisory
- itsourcecode.commitreproduct
- vuldb.com/vuln/365346mitrevdb-entrytechnical-description
- vuldb.com/vuln/365346/ctimitresignaturepermissions-required
News mentions
0No linked articles in our index yet.