| Title | SourceCodester Loan Management System 1.0 SQL Injection |
|---|
| Description | A SQL injection vulnerability exists in Loan Management System 1.0. The flaw is found in the save_loan action of the file ajax.php. Manipulation of the POST parameter 'borrower_id' leads to time-based blind SQL injection. An authenticated attacker can use the SLEEP() function to exfiltrate database information by observing server response times. |
|---|
| Source | ⚠️ https://github.com/meifukun/Web-Security-PoCs/blob/main/Loan-Management-System/SQLi-SaveLoan-borrowerId.md |
|---|
| User | Anonymous User |
|---|
| Submission | 03/25/2026 03:03 (16 days ago) |
|---|
| Moderation | 04/08/2026 17:14 (15 days later) |
|---|
| Status | Duplicate |
|---|
| VulDB entry | 354487 [SourceCodester Loan Management System 1.0 POST Request ajax.php save_loan borrower_id sql injection] |
|---|
| Points | 0 |
|---|