CVE-2026-7077: itsourcecode Courier Management System SQLi Exploited
The National Vulnerability Database has identified CVE-2026-7077, a high-severity SQL injection vulnerability impacting itsourcecode Courier Management System 1.0. The flaw resides in an unknown function within the /edit_parcel.php file, where manipulating the ID argument allows for remote SQL injection. This isn’t a theoretical issue; an exploit is publicly available and actively being used in the wild.
This vulnerability carries a CVSSv3.1 score of 7.3 (HIGH), with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L. This means an unauthenticated attacker can exploit it over the network with low complexity, without user interaction, to achieve partial confidentiality, integrity, and availability impacts. The National Vulnerability Database highlights CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)) as the underlying weaknesses.
For defenders, this is a critical alert. Any organization using itsourcecode Courier Management System 1.0 is directly exposed. The public availability of an exploit drastically lowers the bar for attackers, making this an immediate threat. Attackers will leverage this to gain unauthorized access to sensitive parcel data, manipulate records, or potentially compromise the underlying database server.
What This Means For You
- If your organization uses itsourcecode Courier Management System 1.0, you are vulnerable to CVE-2026-7077. Patch or mitigate this immediately. Audit your logs for any suspicious activity related to `/edit_parcel.php` and SQL errors. Assume compromise if you're running this software unpatched.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7077: itsourcecode Courier Management SQLi via edit_parcel.php
title: CVE-2026-7077: itsourcecode Courier Management SQLi via edit_parcel.php
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects exploitation attempts against itsourcecode Courier Management System 1.0 via the edit_parcel.php file. The 'ID' parameter is manipulated to inject SQL commands, as indicated by common SQLi patterns like 'OR 1=1' or 'UNION SELECT'.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7077/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/edit_parcel.php'
cs-uri-query|contains:
- 'ID=';
- 'OR 1=1';
- 'UNION SELECT'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7077 | SQLi | itsourcecode Courier Management System 1.0 |
| CVE-2026-7077 | SQLi | Vulnerable file: /edit_parcel.php |
| CVE-2026-7077 | SQLi | Vulnerable argument: ID |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 06:15 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.