{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-4624/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["sql-injection","cve-2026-4624","web-application"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA SQL injection vulnerability, identified as CVE-2026-4624, affects SourceCodester Online Library Management System version 1.0. The vulnerability resides within the \u003ccode\u003e/home.php\u003c/code\u003e file, specifically in the parameter handler component. By manipulating the \u003ccode\u003esearchField\u003c/code\u003e argument, an attacker can inject malicious SQL code. The attack is remotely exploitable, meaning that an attacker does not need local access to the server. Given the public availability of the exploit, organizations using the…\u003c/p\u003e\n","date_modified":"2026-03-24T12:00:00Z","date_published":"2026-03-24T12:00:00Z","id":"/briefs/2026-03-online-library-sqli/","summary":"A remote SQL injection vulnerability (CVE-2026-4624) exists in SourceCodester Online Library Management System 1.0 by manipulating the 'searchField' parameter in the /home.php file, potentially allowing attackers to execute arbitrary SQL commands.","title":"SourceCodester Online Library Management System SQL Injection Vulnerability (CVE-2026-4624)","url":"https://feed.craftedsignal.io/briefs/2026-03-online-library-sqli/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-4624","version":"https://jsonfeed.org/version/1.1"}