Description
A vulnerability has been found in code-projects Online Music Site 1.0. This affects an unknown function of the file /Frontend/AlbumByCategory.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-01-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A web input parameter in the file AlbumByCategory.php is not properly sanitized, allowing an attacker to inject arbitrary SQL statements through a manipulated ID argument. This SQL injection flaw can lead to unauthorized data exposure, data manipulation, or in some configurations to remote code execution if the database is compromised or misconfigured. The weakness illustrated by CWE-89 is a classic case of unsanitized user input permitting arbitrary query execution.

Affected Systems

The vulnerability affects the code-projects Online Music Site, version 1.0. This includes the frontend component album handling script located at /Frontend/AlbumByCategory.php. No other product versions were identified as affected.

Risk and Exploitability

The severity score of 6.9 indicates a moderate to high risk. The EPSS score is below 1%, suggesting a low probability of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, so no public exploitation resources are confirmed. Attack vectors are remote, requiring only that a user supplies a crafted ID value in a request that reaches the vulnerable script. Successful exploitation would give the attacker the ability to read or alter database records associated with album listings.

Generated by OpenCVE AI on April 18, 2026 at 08:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a patched version of Code-Projects Online Music Site where the AlbumByCategory.php input validation has been fixed.
  • Implement server‑side input validation and use parameterized queries or prepared statements when handling the ID parameter to eliminate unsanitized SQL entry.
  • Deploy a web application firewall or intrusion detection rule tailored to block typical SQL injection payloads against the AlbumByCategory.php endpoint.

Generated by OpenCVE AI on April 18, 2026 at 08:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Music Site
CPEs cpe:2.3:a:fabian:online_music_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Music Site

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Music Site
Vendors & Products Code-projects
Code-projects online Music Site

Fri, 02 Jan 2026 18:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Online Music Site 1.0. This affects an unknown function of the file /Frontend/AlbumByCategory.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Online Music Site AlbumByCategory.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Music Site
Fabian Online Music Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:10:21.010Z

Reserved: 2026-01-02T07:56:18.343Z

Link: CVE-2026-0569

cve-icon Vulnrichment

Updated: 2026-01-05T20:45:13.124Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-02T19:15:47.260

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0569

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:45:41Z

Weaknesses