CVE-2026-2211

7.3 HIGH

📋 TL;DR

This SQL injection vulnerability in code-projects Online Music Site 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter in the AdminDeleteCategory.php file. The vulnerability affects all installations of version 1.0 that have the vulnerable file accessible. Attackers can potentially read, modify, or delete database contents.

💻 Affected Systems

Products:
  • code-projects Online Music Site
Versions: 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the /Administrator/PHP/AdminDeleteCategory.php file to be accessible, which is likely in default installations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including credential theft, data destruction, and potential remote code execution if database permissions allow file system access.

🟠

Likely Case

Unauthorized data access and manipulation, potentially leading to admin account takeover, data exfiltration, or site defacement.

🟢

If Mitigated

Limited impact with proper input validation and database permissions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public disclosure includes technical details making exploitation straightforward. The vulnerability is in an administrative endpoint but appears accessible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider implementing parameterized queries or input validation in the AdminDeleteCategory.php file.

🔧 Temporary Workarounds

Input Validation

all

Add server-side validation to ensure ID parameter contains only numeric values

Modify AdminDeleteCategory.php to validate $_GET['ID'] or $_POST['ID'] is numeric before processing

Access Restriction

all

Restrict access to the vulnerable file using web server configuration

Add 'Deny from all' to .htaccess in /Administrator/PHP/ directory for Apache
Use appropriate deny rules for nginx or IIS

🧯 If You Can't Patch

  • Implement WAF rules to block SQL injection patterns targeting the ID parameter
  • Isolate the application behind a reverse proxy with request filtering

🔍 How to Verify

Check if Vulnerable:

Test if accessing /Administrator/PHP/AdminDeleteCategory.php?ID=1' returns SQL errors or behaves unexpectedly

Check Version:

Check application files for version information, typically in readme files or configuration

Verify Fix Applied:

Test SQL injection payloads against the ID parameter and verify they are rejected or sanitized

📡 Detection & Monitoring

Log Indicators:

  • SQL syntax errors in application logs
  • Unusual database queries from web server IP
  • Multiple failed requests to AdminDeleteCategory.php with SQL patterns

Network Indicators:

  • HTTP requests containing SQL keywords (UNION, SELECT, etc.) in ID parameter
  • Abnormal request patterns to administrative endpoints

SIEM Query:

web.url:*AdminDeleteCategory.php* AND (web.param:*UNION* OR web.param:*SELECT* OR web.param:*' OR*)

🔗 References

📤 Share & Export