Description
A vulnerability was determined in code-projects Content Management System 1.0. This impacts an unknown function of the file search.php. This manipulation of the argument Value causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

An SQL injection flaw exists in the search.php component of the code-projects Content Management System, allowing an attacker to manipulate the Value argument and execute arbitrary SQL queries against the back‑end database. The vulnerability can enable unauthorized reading, modification, or deletion of data, compromising the confidentiality, integrity, and possibly the availability of the system’s data store. The weakness falls under CWE‑89 and represents a classic web‑application injection flaw.

Affected Systems

The flaw is present in code‑projects Content Management System version 1.0 and may affect any deployment that has not incorporated a later, patched release. The vulnerability occurs in the search.php file and is tied to the unfiltered Value parameter used in database queries.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium‑high severity, with a low probability of exploitation (EPSS < 1%) and no listing in the CISA KEV catalog. The attack vector is remote, requiring the attacker to issue crafted HTTP requests containing malicious SQL statements against the search endpoint, which can be performed from outside the network without authentication. The risk is heightened in environments that expose the search functionality to untrusted users or the internet.

Generated by OpenCVE AI on April 18, 2026 at 08:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether an updated version of the Content Management System is available that addresses the search.php SQL injection flaw, and apply the official patch if available.
  • Replace or modify the code in search.php to use parameterized queries and proper input validation, ensuring the Value argument cannot be injected into the SQL statement.
  • Deploy a Web Application Firewall or equivalent input‑filtering mechanism tuned to detect and block malformed SQL injection attempts on the search endpoint.
  • Configure monitoring and logging of database queries for anomalous patterns and promptly investigate any detected injection attempts.

Generated by OpenCVE AI on April 18, 2026 at 08:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:*:*:*:*:*:*:*:*

Thu, 15 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects content Management System
Vendors & Products Code-projects
Code-projects content Management System

Fri, 02 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Content Management System 1.0. This impacts an unknown function of the file search.php. This manipulation of the argument Value causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.
Title code-projects Content Management System search.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:04:48.943Z

Reserved: 2026-01-01T10:45:42.664Z

Link: CVE-2026-0546

cve-icon Vulnrichment

Updated: 2026-01-06T20:17:57.711Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T09:15:42.917

Modified: 2026-01-15T16:41:48.480

Link: CVE-2026-0546

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:45:41Z

Weaknesses