CVE-2026-3152
Published: 25 February 2026
Summary
CVE-2026-3152 is a high-severity Injection (CWE-74) vulnerability in Angeljudesuarez College Management System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.
Developer assessments and testing (including injection-focused techniques) identify improper neutralization of special elements, and the verifiable flaw remediation corrects them pre-deployment.
Validates query inputs to prevent SQL syntax or command manipulation.
Identifies indicators of injection attacks (command, SQL, LDAP, etc.) via anomaly and attack monitoring.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a remotely accessible web application (College Management System) directly maps to exploitation of public-facing apps for initial access and data manipulation.
NVD Description
A flaw has been found in itsourcecode College Management System 1.0. This issue affects some unknown processing of the file /admin/teacher-salary.php. This manipulation of the argument teacher_id causes sql injection. It is possible to initiate the attack remotely. The exploit…
more
has been published and may be used.
Deeper analysisAI
CVE-2026-3152 is a SQL injection vulnerability (CWE-74, CWE-89) in itsourcecode College Management System 1.0. The issue affects the processing of the teacher_id argument in the /admin/teacher-salary.php file, allowing malicious input to manipulate SQL queries.
The vulnerability is remotely exploitable by unauthenticated attackers with low attack complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation enables limited impacts on confidentiality, integrity, and availability, such as unauthorized data access or modification. An exploit has been published and may be used.
Advisories referenced in VulDB entries (ctiid.347660, id.347660, submit.758834) and a GitHub issue (ltranquility/cve_submit/issues/6) document the flaw, along with the vendor site at itsourcecode.com. No specific patches or mitigations are detailed in the available information.
The exploit's public availability increases the risk of real-world abuse against exposed instances of this management system.
Details
- CWE(s)