PHP EUVD-2026-23920

| CVE-2026-39111 HIGH
SQL Injection (CWE-89)
2026-04-20 mitre GHSA-2mm2-ghgp-p33q
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Re-analysis Queued
Apr 20, 2026 - 18:52 vuln.today
cvss_changed
Analysis Generated
Apr 20, 2026 - 18:28 vuln.today
CVSS changed
Apr 20, 2026 - 18:22 NVD
7.5 (HIGH)

DescriptionNVD

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries and retrieve sensitive user data.

AnalysisAI

SQL Injection in Apartment Visitors Management System v1.1 allows unauthenticated remote attackers to extract sensitive user data via the forgot-password.php email parameter. The vulnerability requires no authentication (PR:N), no user interaction (UI:N), and has low attack complexity (AC:L), enabling trivial exploitation against any internet-facing installation. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all systems running Apartment Visitors Management System v1.1 and isolate internet-facing instances or restrict network access to trusted sources only. Within 7 days: Contact the vendor for security guidance and inquire about patches or updated versions; consider migrating to an alternative visitor management solution if no patch roadmap exists. …

Sign in for detailed remediation steps.

Share

EUVD-2026-23920 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy