<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4632 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4632/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 24 Mar 2026 05:16:24 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4632/feed.xml" rel="self" type="application/rss+xml"/><item><title>SQL Injection Vulnerability in itsourcecode Online Enrollment System 1.0 (CVE-2026-4632)</title><link>https://feed.craftedsignal.io/briefs/2026-03-online-enrollment-sqli/</link><pubDate>Tue, 24 Mar 2026 05:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-online-enrollment-sqli/</guid><description>CVE-2026-4632 is a SQL Injection vulnerability in itsourcecode Online Enrollment System 1.0, specifically affecting the Parameter Handler component at '/sms/user/index.php?view=add', allowing a remote attacker to inject malicious SQL code by manipulating the 'Name' argument, with a public exploit available.</description><content:encoded><![CDATA[<p>A SQL Injection vulnerability, identified as CVE-2026-4632, has been discovered in itsourcecode Online Enrollment System version 1.0. The vulnerability resides within the Parameter Handler component of the application, specifically in the <code>/sms/user/index.php?view=add</code> file. By manipulating the <code>Name</code> argument, a remote attacker can inject malicious SQL code, potentially leading to unauthorized data access, modification, or deletion. The existence of a publicly available exploit increases the…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-4632</category></item></channel></rss>