CVE-2026-2009
Unknown Unknown - Not Provided
Improper Access Control in SourceCodester Gas Agency createUser.php

Publication date: 2026-02-06

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in SourceCodester Gas Agency Management System 1.0. This issue affects some unknown processing of the file /gasmark/php_action/createUser.php. Executing a manipulation can lead to improper access controls. It is possible to launch the attack remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-06
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-02-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
mayurik gas_agency_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2009 is an Improper Access Control vulnerability in the SourceCodester Gas Agency Management System version 1.0. It affects the file /gasmark/php_action/createUser.php and allows an authenticated user without administrative privileges to perform administrative actions by directly accessing privileged backend endpoints.'}, {'type': 'paragraph', 'content': "The system only enforces access restrictions through client-side user interface controls and does not implement server-side authorization checks to verify the user's role before processing sensitive requests. This lack of server-side validation leads to privilege escalation, enabling unauthorized users to execute administrative functions such as creating new users, bookings, consumers, and cylinders."}] [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying unauthorized access attempts to the privileged backend endpoint /gasmark/php_action/createUser.php. One method is to look for HTTP requests targeting this URL, especially POST requests that include parameters like userName, upassword, and uemail.'}, {'type': 'paragraph', 'content': 'Additionally, attackers may use Google Dorking to find vulnerable targets by searching for URLs containing inurl:gasmark/php_action/createUser.php.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system, you can monitor web server logs for suspicious POST requests to the createUser.php endpoint with unusual parameters or from non-administrative users.'}, {'type': 'list_item', 'content': 'Use command-line tools like grep to search web server logs for access to the vulnerable endpoint, e.g.:'}, {'type': 'list_item', 'content': 'grep "/gasmark/php_action/createUser.php" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': 'Check for POST requests with suspicious parameters or from unexpected IP addresses.'}, {'type': 'list_item', 'content': 'Use network monitoring tools or intrusion detection systems to alert on HTTP POST requests to this endpoint.'}] [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Currently, there are no known countermeasures or official patches available for this vulnerability.

Immediate mitigation steps include restricting access to the vulnerable endpoint /gasmark/php_action/createUser.php by implementing server-side authorization checks to verify user roles before processing requests.

As a temporary measure, you can limit access to this endpoint by IP address or require additional authentication mechanisms at the web server or application firewall level.

Monitoring and logging access to this endpoint is also recommended to detect and respond to exploitation attempts.

Ultimately, replacing the affected component or product with a secure alternative is suggested to fully mitigate the risk.


How can this vulnerability impact me? :

This vulnerability allows unauthorized users to escalate their privileges and perform administrative actions remotely. An attacker can create new users, bookings, consumers, and cylinders without proper authorization.

The impact includes a complete compromise of system integrity, with a high risk of data manipulation and abuse. Confidentiality, integrity, and availability of the system can be affected, potentially leading to unauthorized access and control over critical system functions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart