CVE-2026-5210
Published: 31 March 2026
Summary
CVE-2026-5210 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Sourcecodester (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific local file inclusion flaw in the Leave Application System by identifying, prioritizing, and applying corrections or patches.
Validates the manipulated 'page' argument to ensure it does not enable external control of file names or paths, preventing file inclusion exploitation.
Restricts the 'page' parameter to whitelisted values or safe patterns, blocking path traversal sequences used in the file inclusion attack.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing web app directly enables T1190 exploitation; allows unauthorized local file access facilitating T1005 data collection.
NVD Description
A vulnerability was detected in SourceCodester Leave Application System 1.0. This affects an unknown part. Performing a manipulation of the argument page results in file inclusion. Remote exploitation of the attack is possible. The exploit is now public and may…
more
be used.
Deeper analysisAI
CVE-2026-5210 is a file inclusion vulnerability in SourceCodester Leave Application System 1.0, affecting an unknown component. The issue arises from manipulation of the "page" argument, enabling local file inclusion as classified under CWE-73 (External Control of File Name or Path). It carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and low attack complexity.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. Successful exploitation can result in low-level impacts to confidentiality, integrity, and availability, such as unauthorized access to local files or limited system disruption, depending on the target's configuration.
Advisories referenced in VulDB entries (vuln/354346) and a Medium post detail the local file inclusion flaw and provide public exploit information. The SourceCodester website is also listed among references, though specific patch or mitigation guidance is not detailed in the available descriptions.
Details
- CWE(s)