๐Ÿ” CVE Alert

CVE-2026-8126

HIGH 7.3

SourceCodester Comment System post_comment.php sql injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th

A flaw has been found in SourceCodester Comment System 1.0. This issue affects some unknown processing of the file post_comment.php. This manipulation of the argument Name causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

CWE CWE-89 CWE-74
Vendor sourcecodester
Product comment system
Published May 8, 2026
Last Updated May 8, 2026
Stay Ahead of the Next One

Get instant alerts for sourcecodester comment system

Be the first to know when new high vulnerabilities affecting sourcecodester comment system are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

SourceCodester / Comment System
1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/361916 vuldb.com: https://vuldb.com/vuln/361916/cti vuldb.com: https://vuldb.com/submit/808686 github.com: https://github.com/redshadowword-cell/CVE/issues/7 sourcecodester.com: https://www.sourcecodester.com/

Credits

๐Ÿ” n0name (VulDB User)