CVE-2026-2009
Improper Access Control in SourceCodester Gas Agency createUser.php
Publication date: 2026-02-06
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mayurik | gas_agency_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-266 | A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-2009 is an Improper Access Control vulnerability in the SourceCodester Gas Agency Management System version 1.0. It affects the file /gasmark/php_action/createUser.php and allows an authenticated user without administrative privileges to perform administrative actions by directly accessing privileged backend endpoints.'}, {'type': 'paragraph', 'content': "The system only enforces access restrictions through client-side user interface controls and does not implement server-side authorization checks to verify the user's role before processing sensitive requests. This lack of server-side validation leads to privilege escalation, enabling unauthorized users to execute administrative functions such as creating new users, bookings, consumers, and cylinders."}] [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying unauthorized access attempts to the privileged backend endpoint /gasmark/php_action/createUser.php. One method is to look for HTTP requests targeting this URL, especially POST requests that include parameters like userName, upassword, and uemail.'}, {'type': 'paragraph', 'content': 'Additionally, attackers may use Google Dorking to find vulnerable targets by searching for URLs containing inurl:gasmark/php_action/createUser.php.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system, you can monitor web server logs for suspicious POST requests to the createUser.php endpoint with unusual parameters or from non-administrative users.'}, {'type': 'list_item', 'content': 'Use command-line tools like grep to search web server logs for access to the vulnerable endpoint, e.g.:'}, {'type': 'list_item', 'content': 'grep "/gasmark/php_action/createUser.php" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': 'Check for POST requests with suspicious parameters or from unexpected IP addresses.'}, {'type': 'list_item', 'content': 'Use network monitoring tools or intrusion detection systems to alert on HTTP POST requests to this endpoint.'}] [2, 3]
What immediate steps should I take to mitigate this vulnerability?
Currently, there are no known countermeasures or official patches available for this vulnerability.
Immediate mitigation steps include restricting access to the vulnerable endpoint /gasmark/php_action/createUser.php by implementing server-side authorization checks to verify user roles before processing requests.
As a temporary measure, you can limit access to this endpoint by IP address or require additional authentication mechanisms at the web server or application firewall level.
Monitoring and logging access to this endpoint is also recommended to detect and respond to exploitation attempts.
Ultimately, replacing the affected component or product with a secure alternative is suggested to fully mitigate the risk.
How can this vulnerability impact me? :
This vulnerability allows unauthorized users to escalate their privileges and perform administrative actions remotely. An attacker can create new users, bookings, consumers, and cylinders without proper authorization.
The impact includes a complete compromise of system integrity, with a high risk of data manipulation and abuse. Confidentiality, integrity, and availability of the system can be affected, potentially leading to unauthorized access and control over critical system functions.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know