Description
A vulnerability has been found in code-projects Online Product Reservation System 1.0. Affected by this issue is some unknown functionality of the file /handgunner-administrator/delete.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-01-04
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The Online Product Reservation System version 1.0 contains a flaw in the delete.php page where the ID argument is not properly sanitized. Attackers can inject malicious SQL through this parameter, resulting in unauthorized deletion or modification of reservation records and potentially exposing sensitive data. The vulnerability is classified as a SQL injection (CWE‑74 and CWE‑89) that can be exploited remotely.

Affected Systems

The affected vendor is code‑projects, and the product impacted is the Online Product Reservation System, specifically version 1.0. The vulnerability resides in the /handgunner‑administrator/delete.php endpoint used by the system’s administrative interface.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity with potential for data loss. The EPSS score of less than 1% suggests a low current exploitation probability, but the issue is publicly disclosed and can be leveraged by remote attackers. Although the vulnerability is not listed in the CISA KEV catalog, the attack vector is remote and relies on manipulating an HTTP GET or POST parameter, meaning any user with access to the web interface could trigger it.

Generated by OpenCVE AI on April 18, 2026 at 08:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or upgrade to a fixed release of the Online Product Reservation System.
  • Modify delete.php to use prepared statements and bind the ID parameter, eliminating direct SQL concatenation.
  • Enforce strict access control so that only authenticated administrators can reach the delete endpoint and validate the ID input against expected numeric patterns before execution.

Generated by OpenCVE AI on April 18, 2026 at 08:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Product Reservation System
CPEs cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Product Reservation System

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Product Reservation System
Vendors & Products Code-projects
Code-projects online Product Reservation System

Sun, 04 Jan 2026 12:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Online Product Reservation System 1.0. Affected by this issue is some unknown functionality of the file /handgunner-administrator/delete.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Online Product Reservation System delete.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Product Reservation System
Fabian Online Product Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:12:22.417Z

Reserved: 2026-01-03T16:01:49.690Z

Link: CVE-2026-0578

cve-icon Vulnrichment

Updated: 2026-01-06T19:30:36.199Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-04T12:15:42.460

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0578

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses