CVE-2026-5326
Received Received - Intake
Authorization Bypass in SourceCodester Leave Application User Handler

Publication date: 2026-04-02

Last updated on: 2026-04-02

Assigner: VulDB

Description
A vulnerability was identified in SourceCodester Leave Application System 1.0. Impacted is an unknown function of the file /index.php?page=manage_user of the component User Information Handler. Such manipulation of the argument ID leads to authorization bypass. The attack can be executed remotely. The exploit is publicly available and might be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-02
Generated
2026-05-06
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sourcecodester leave_application_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the SourceCodester Leave Application System 1.0, specifically in an unknown function within the file /index.php?page=manage_user of the User Information Handler component.

The issue arises from manipulation of the argument ID, which leads to an authorization bypass. This means an attacker can remotely exploit this flaw to gain unauthorized access or privileges without proper authentication.

The exploit for this vulnerability is publicly available, increasing the risk of it being used maliciously.


How can this vulnerability impact me? :

The vulnerability allows an attacker to bypass authorization controls remotely by manipulating the ID argument in the affected component.

This can lead to unauthorized access to user information or functionalities that should be restricted, potentially compromising sensitive data.

Since the exploit is publicly available, the risk of exploitation is higher, which could result in data breaches or unauthorized actions within the system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart