CVE-2026-2983
Received Received - Intake
Improper Access Control in SourceCodester Bulk Import Allows Remote Exploitation

Publication date: 2026-02-23

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was determined in SourceCodester Student Result Management System 1.0. The impacted element is an unknown function of the file /admin/core/import_users.php of the component Bulk Import. This manipulation of the argument File causes improper access controls. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-23
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
munyweki student_result_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2983 is a critical improper access control vulnerability in SourceCodester Student Result Management System version 1.0, specifically in the Bulk Import component within the file /admin/core/import_users.php.'}, {'type': 'paragraph', 'content': "The vulnerability arises because the application does not perform any authentication or session validation before processing file uploads, allowing an attacker to manipulate the 'file' argument."}, {'type': 'paragraph', 'content': 'An unauthenticated remote attacker can upload a specially crafted Excel (.xlsx) file, which the server parses and uses to insert arbitrary user records into the staff database table.'}, {'type': 'paragraph', 'content': "This enables the attacker to create unauthorized accounts with elevated privileges, such as 'Teacher', leading to unauthorized access and persistent compromise of the system."}] [1, 2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability can have significant impacts including unauthorized remote access to the system without any authentication.'}, {'type': 'paragraph', 'content': 'Attackers can create unauthorized user accounts with elevated privileges, compromising the confidentiality, integrity, and availability of the system.'}, {'type': 'paragraph', 'content': "The system's database can be persistently polluted with malicious or unauthorized data, potentially disrupting normal operations and trustworthiness of the system."}, {'type': 'paragraph', 'content': 'Because exploitation requires no user interaction and can be performed remotely, the risk of compromise is high.'}] [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for the presence of the vulnerable endpoint `/admin/core/import_users.php` in the SourceCodester Student Result Management System version 1.0.'}, {'type': 'paragraph', 'content': 'One method to locate vulnerable targets is by using Google dorking with the query: `inurl:admin/core/import_users.php`.'}, {'type': 'paragraph', 'content': 'On your network or system, you can use tools like curl or wget to test if the endpoint is accessible without authentication.'}, {'type': 'list_item', 'content': 'curl -I http://targetsite.com/admin/core/import_users.php'}, {'type': 'list_item', 'content': 'wget --spider http://targetsite.com/admin/core/import_users.php'}, {'type': 'paragraph', 'content': "Additionally, monitoring for unusual file upload activity to this endpoint or unexpected creation of user accounts with 'Teacher' privileges in the `tbl_staff` database table can indicate exploitation attempts."}] [1]


What immediate steps should I take to mitigate this vulnerability?

No known mitigations or countermeasures have been published for this vulnerability.

It is suggested to replace the affected product with an alternative solution that does not contain this vulnerability.

As an immediate step, restrict access to the `/admin/core/import_users.php` endpoint by implementing authentication and access controls, or by blocking access via firewall rules.

Monitor your system for unauthorized user account creations and unusual file upload activities to detect potential exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart