itsourcecode Construction Management System SQLi: CVE-2026-7073
A high-severity SQL injection vulnerability, tracked as CVE-2026-7073, has been identified in itsourcecode Construction Management System version 1.0. The National Vulnerability Database reports this flaw resides within an unknown part of the /execute.php file, where manipulation of the code argument can lead to arbitrary SQL execution.
This vulnerability carries a CVSSv3.1 score of 7.3, indicating a significant risk. Attackers can exploit this remotely without authentication, making it particularly dangerous. Crucially, the exploit code for CVE-2026-7073 has been publicly disclosed, meaning it’s likely already being weaponized in the wild.
For defenders, this is a critical alert. SQL injection remains a top attack vector, often leading to full database compromise, data exfiltration, or unauthorized system access. Given the ease of exploitation and public availability of exploit code, organizations using this specific system are at immediate risk.
What This Means For You
- If your organization uses itsourcecode Construction Management System 1.0, you are directly exposed to remote SQL injection via CVE-2026-7073. Immediately identify all instances of this system and isolate them from public access. There is no patch yet, so mitigation is your only defense. Review all web application logs for suspicious activity on `/execute.php` and prepare for potential data exfiltration or system compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7073 - itsourcecode Construction Management SQLi via execute.php
title: CVE-2026-7073 - itsourcecode Construction Management SQLi via execute.php
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects exploitation attempts against itsourcecode Construction Management System 1.0 via CVE-2026-7073. The rule specifically looks for requests to '/execute.php' containing SQL injection keywords like 'UNION', 'SELECT', 'FROM', and 'information_schema' within the 'code' parameter, indicating a potential SQL injection attack targeting the database.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7073/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/execute.php'
cs-uri-query|contains:
- 'code='
cs-uri-query|contains:
- 'UNION'
cs-uri-query|contains:
- 'SELECT'
cs-uri-query|contains:
- 'FROM'
cs-uri-query|contains:
- 'information_schema'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7073 | SQLi | itsourcecode Construction Management System 1.0 |
| CVE-2026-7073 | SQLi | Vulnerable file: /execute.php |
| CVE-2026-7073 | SQLi | Vulnerable argument: code |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 04:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.