CVE-2026-3734
Received Received - Intake
Improper Authorization in SourceCodester Client DBMS Endpoint

Publication date: 2026-03-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in SourceCodester Client Database Management System 1.0. Affected is an unknown function of the file /fetch_manager_details.php of the component Endpoint. This manipulation of the argument manager_id causes improper authorization. The attack can be initiated remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
lerouxyxchire client_database_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3734 is a critical improper authorization vulnerability in SourceCodester Client Database Management System (CDMS) version 1.0. It affects the endpoint /fetch_manager_details.php, where manipulation of the manager_id parameter allows attackers to bypass authorization controls.

This vulnerability is a form of Broken Access Control, specifically an Insecure Direct Object Reference (IDOR), which means attackers can access or manipulate data they should not be able to by tampering with input parameters.

The flaw allows unauthenticated remote attackers to enumerate sensitive internal data, delete manager records, create internal records, and modify the application state without any authentication or proper role validation.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized disclosure of sensitive internal data, deletion of manager records, and creation of unauthorized internal records.

Attackers can remotely exploit this flaw without any authentication, potentially leading to full system compromise by modifying the application state and abusing privileged functions.

The confidentiality, integrity, and availability of the system are all at risk due to this vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for unauthorized access attempts to the endpoint /fetch_manager_details.php with manipulation of the manager_id parameter.'}, {'type': 'paragraph', 'content': 'One method to discover vulnerable targets is by using Google Dorking with the query: inurl:fetch_manager_details.php.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts on your system, you can monitor HTTP requests to the endpoint /cdm/fetch_manager_details.php and look for unusual or unauthorized queries with the manager_id parameter.'}, {'type': 'paragraph', 'content': 'Example commands to detect such activity might include:'}, {'type': 'list_item', 'content': 'Using grep on web server logs to find access to the vulnerable endpoint: grep "/cdm/fetch_manager_details.php" /var/log/apache2/access.log'}, {'type': 'list_item', 'content': "Using tcpdump or Wireshark to capture HTTP traffic and filter for requests to fetch_manager_details.php: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep fetch_manager_details.php"}, {'type': 'list_item', 'content': 'Using curl or similar tools to test the endpoint manually: curl -v "http://target/cdm/fetch_manager_details.php?manager_id=1"'}] [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing proper authentication and authorization checks on all sensitive backend endpoints, especially /cdm/fetch_manager_details.php.

Ensure that session validation is included (e.g., including session.php) and implement role-based access control to restrict access to privileged functions.

Implement CSRF protection to prevent unauthorized requests.

Conduct a secure code audit to identify and fix missing or improper authorization checks.

If possible, replace the affected component with a secure alternative to avoid exploitation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart