Description
A vulnerability was detected in code-projects Content Management System 1.0. The affected element is an unknown function of the file /pages.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Published: 2026-01-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Check Updates
AI Analysis

Impact

An attacker manipulating the ID argument in the file /pages.php can inject arbitrary SQL statements into the underlying query. This flaw allows the exploitation of unvalidated input to gain unauthorized database access, potentially exposing, modifying, or deleting sensitive data. The vulnerability is categorized as a typical SQL injection weakness, which can lead to data breach or further escalation if combined with other weaknesses.

Affected Systems

The affected product is code-projects Content Management System version 1.0. The vulnerability exists in an unknown function within the pages.php script of this system.

Risk and Exploitability

The issue carries a CVSS score of 6.9, indicating moderate severity, while the EPSS score is below 1 %, suggesting a low likelihood of exploitation in the near term. It is not listed in the CISA KEV catalog, and the attack can be performed remotely. Exploitation requires only the ability to supply a crafted ID parameter, so the attack is feasible for anyone who can hit the web interface.

Generated by OpenCVE AI on April 18, 2026 at 08:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched version of the Content Management System once it becomes available on the vendor’s site.
  • Modify the /pages.php code to use parameterized queries or prepared statements for all database interactions involving the ID argument.
  • Restrict the database account used by the application to the minimal privileges required, ensuring it cannot execute arbitrary SELECT, UPDATE, DELETE, or administrative commands.

Generated by OpenCVE AI on April 18, 2026 at 08:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 20:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects content Management System
Vendors & Products Code-projects
Code-projects content Management System

Fri, 02 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 02 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Content Management System 1.0. The affected element is an unknown function of the file /pages.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
Title code-projects Content Management System pages.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:09:55.183Z

Reserved: 2026-01-02T07:52:08.948Z

Link: CVE-2026-0567

cve-icon Vulnrichment

Updated: 2026-01-02T21:07:00.572Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T18:15:54.747

Modified: 2026-01-20T20:48:22.890

Link: CVE-2026-0567

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:45:41Z

Weaknesses