CVE-2026-0583

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in code-projects Online Product Reservation System 1.0 allows attackers to manipulate database queries through the email address parameter during user login. Remote attackers can potentially access, modify, or delete database contents. All installations of version 1.0 with the vulnerable component are affected.

💻 Affected Systems

Products:
  • code-projects Online Product Reservation System
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the User Login component specifically in app/user/login.php file. Any installation with this component is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data theft, data destruction, authentication bypass, and potential remote code execution if database permissions allow.

🟠

Likely Case

Unauthorized data access, credential theft, and potential privilege escalation leading to system compromise.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only error messages or failed login attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available on GitHub. Exploitation requires no authentication and uses simple SQL injection techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement proper input validation and parameterized queries for the emailadd parameter in login.php

Modify app/user/login.php to use prepared statements with parameterized queries

Web Application Firewall (WAF)

all

Deploy WAF rules to block SQL injection patterns

Configure WAF to detect and block SQL injection attempts on login endpoints

🧯 If You Can't Patch

  • Isolate the system from internet access and restrict to internal network only
  • Implement strict network segmentation and monitor all database access attempts

🔍 How to Verify

Check if Vulnerable:

Test the login endpoint with SQL injection payloads in the emailadd parameter and observe database errors or unexpected behavior

Check Version:

Check system documentation or configuration files for version information

Verify Fix Applied:

Test with SQL injection payloads after implementing fixes - should return proper error messages without database interaction

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL syntax in login attempts
  • Multiple failed login attempts with SQL characters
  • Database error messages in application logs

Network Indicators:

  • SQL keywords in HTTP POST parameters to login endpoint
  • Unusual database connection patterns

SIEM Query:

source="web_logs" AND (uri="/app/user/login.php" OR uri="/login") AND (param="emailadd" AND value CONTAINS "' OR " OR "--" OR ";")

🔗 References

📤 Share & Export