CVE-2026-5326
Authorization Bypass in SourceCodester Leave Application User Handler
Publication date: 2026-04-02
Last updated on: 2026-04-02
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sourcecodester | leave_application_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SourceCodester Leave Application System 1.0, specifically in an unknown function within the file /index.php?page=manage_user of the User Information Handler component.
The issue arises from manipulation of the argument ID, which leads to an authorization bypass. This means an attacker can remotely exploit this flaw to gain unauthorized access or privileges without proper authentication.
The exploit for this vulnerability is publicly available, increasing the risk of it being used maliciously.
How can this vulnerability impact me? :
The vulnerability allows an attacker to bypass authorization controls remotely by manipulating the ID argument in the affected component.
This can lead to unauthorized access to user information or functionalities that should be restricted, potentially compromising sensitive data.
Since the exploit is publicly available, the risk of exploitation is higher, which could result in data breaches or unauthorized actions within the system.