CVE-2026-3762

7.3 HIGH

📋 TL;DR

This vulnerability in SourceCodester Client Database Management System allows unauthorized deletion of manager accounts via improper authorization in the /superadmin_delete_manager.php endpoint. Attackers can remotely exploit this to delete administrative users, potentially disrupting system management. All users running affected versions are impacted.

💻 Affected Systems

Products:
  • SourceCodester Client Database Management System
Versions: 1.0 and 3.1
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web application component specifically at the /superadmin_delete_manager.php endpoint.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete loss of administrative access by deleting all manager accounts, leading to system management disruption and potential data manipulation.

🟠

Likely Case

Targeted deletion of specific manager accounts causing operational disruption and privilege escalation opportunities.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls preventing unauthorized access.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit details exist.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this for privilege escalation or disruption.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires manipulation of manager_id parameter but public disclosure increases weaponization likelihood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.sourcecodester.com/

Restart Required: No

Instructions:

Check vendor website for updates. If patch unavailable, implement workarounds immediately.

🔧 Temporary Workarounds

Access Restriction

all

Restrict access to /superadmin_delete_manager.php endpoint using web server configuration

# Apache: Add to .htaccess
<Files "superadmin_delete_manager.php">
    Order deny,allow
    Deny from all
</Files>
# Nginx: Add to server block
location = /superadmin_delete_manager.php {
    deny all;
    return 403;
}

Input Validation

all

Add authorization checks in the PHP file to verify user permissions before processing deletion

# Add at top of superadmin_delete_manager.php
session_start();
if (!isset($_SESSION['user_role']) || $_SESSION['user_role'] !== 'superadmin') {
    http_response_code(403);
    exit('Unauthorized access');
}

🧯 If You Can't Patch

  • Implement network segmentation to isolate the application from untrusted networks
  • Deploy web application firewall (WAF) with rules to block unauthorized access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Test if unauthorized users can access /superadmin_delete_manager.php?manager_id=[valid_id] and delete accounts

Check Version:

Check application version in admin panel or readme files

Verify Fix Applied:

Verify that only authenticated superadmin users can successfully call the deletion endpoint

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /superadmin_delete_manager.php from unauthorized IPs
  • Multiple DELETE operations on manager accounts

Network Indicators:

  • HTTP POST/GET requests to vulnerable endpoint with manager_id parameter

SIEM Query:

source="web_logs" AND uri="/superadmin_delete_manager.php" AND (user_role!="superadmin" OR user_role=null)

🔗 References

📤 Share & Export