CVE-2026-5210
Received
Received - Intake
Remote File Inclusion Vulnerability in SourceCodester Leave Application System
Publication date: 2026-03-31
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
A vulnerability was detected in SourceCodester Leave Application System 1.0. This affects an unknown part. Performing a manipulation of the argument page results in file inclusion. Remote exploitation of the attack is possible. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sourcecodester | leave_application_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SourceCodester Leave Application System 1.0. It involves manipulation of the 'page' argument, which leads to file inclusion. This means an attacker can remotely exploit the system by altering input parameters to include unauthorized files.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to include files on the server, which can lead to unauthorized access to sensitive information, potential execution of malicious code, and compromise of the affected system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70