CVE-2026-2172
📋 TL;DR
This CVE describes a SQL injection vulnerability in code-projects Online Application System for Admission 1.0, specifically in the login endpoint at enrollment/index.php. Attackers can remotely exploit this to execute arbitrary SQL commands against the database. Organizations using this specific software version are affected.
💻 Affected Systems
- code-projects Online Application System for Admission
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including data theft, data manipulation, authentication bypass, and potential remote code execution if database permissions allow.
Likely Case
Unauthorized access to sensitive applicant data, credential theft, and potential system compromise.
If Mitigated
Limited impact with proper input validation, WAF rules, and database permission restrictions in place.
🎯 Exploit Status
Exploit is publicly disclosed and SQL injection is a well-understood attack vector with many automated tools available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: https://code-projects.org/
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Web Application Firewall (WAF) Rules
allImplement WAF rules to block SQL injection patterns targeting the enrollment/index.php endpoint
Input Validation
allAdd server-side input validation to sanitize all user inputs before processing
🧯 If You Can't Patch
- Isolate the vulnerable system behind a reverse proxy with strict input filtering
- Implement network segmentation to limit database access from the application server
🔍 How to Verify
Check if Vulnerable:
Check if enrollment/index.php exists and test with SQL injection payloads like ' OR '1'='1 in login fields
Check Version:
Check software documentation or configuration files for version information
Verify Fix Applied:
Test with SQL injection payloads and verify they are properly sanitized or blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed login attempts with SQL-like patterns
Network Indicators:
- SQL keywords in HTTP POST requests to enrollment/index.php
- Unusual database query patterns
SIEM Query:
source="web_logs" AND uri="/enrollment/index.php" AND (request_body CONTAINS "' OR" OR request_body CONTAINS "UNION" OR request_body CONTAINS "SELECT *")