CVE-2026-0576
📋 TL;DR
This SQL injection vulnerability in code-projects Online Product Reservation System 1.0 allows remote attackers to execute arbitrary SQL commands through manipulated parameters. Attackers can potentially access, modify, or delete database content. All users running version 1.0 are affected.
💻 Affected Systems
- code-projects Online Product Reservation System
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data destruction, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized data access, data manipulation, and potential privilege escalation within the application.
If Mitigated
Limited impact with proper input validation and database permissions, potentially only error messages or failed queries.
🎯 Exploit Status
Public proof-of-concept available on GitHub, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation and Sanitization
allImplement parameterized queries and input validation for all user inputs in prod.php
Modify PHP code to use prepared statements with PDO or mysqli
Web Application Firewall Rules
allBlock SQL injection patterns targeting the vulnerable parameters
Configure WAF to detect and block SQL injection attempts on /handgunner-administrator/prod.php
🧯 If You Can't Patch
- Restrict access to /handgunner-administrator/ directory to trusted IP addresses only
- Implement database user with minimal necessary permissions (read-only if possible)
🔍 How to Verify
Check if Vulnerable:
Test the vulnerable endpoint with SQL injection payloads: curl 'http://target/handgunner-administrator/prod.php?cat=1' OR test with single quote in parameters
Check Version:
Check application files for version information or review installation documentation
Verify Fix Applied:
Test with same SQL injection payloads and verify they are rejected or sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL errors in application logs
- Multiple failed login attempts or parameter manipulation in access logs
Network Indicators:
- SQL keywords in HTTP GET parameters to prod.php
- Unusual database connection patterns
SIEM Query:
source="web_logs" AND uri="/handgunner-administrator/prod.php" AND (param="*sql*" OR param="*union*" OR param="*select*" OR param="*' OR *")
🔗 References
- https://code-projects.org/
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_add_prod.php.md
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_add_prod.php.md#poc
- https://vuldb.com/?ctiid.339460
- https://vuldb.com/?id.339460
- https://vuldb.com/?submit.731012