Description
A security flaw has been discovered in code-projects Online Product Reservation System 1.0. This vulnerability affects unknown code of the file app/user/login.php of the component User Login. The manipulation of the argument emailadd results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-01-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the login component of the Online Product Reservation System allows attackers to manipulate the emailadd argument and inject SQL statements. This vulnerability can enable remote attackers to bypass authentication, read or modify database contents, and potentially compromise the confidentiality, integrity, and availability of the system. The CVE describes the issue as a classic SQL injection that can be triggered from a web request without additional authentication.

Affected Systems

cod‑projects Online Product Reservation System version 1.0, specifically the login.php file in the user login module. No other versions or products are listed as affected in the available data.

Risk and Exploitability

The CVSS score is 6.9, indicating a medium severity risk. The EPSS score is less than 1%, suggesting a very low probability of exploitation in the wild at the time of analysis. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Exploitation is possible remotely via the web application’s emailadd input field and a public exploit has already been released, meaning an attacker only needs to host a malicious payload and send a crafted request to the vulnerable endpoint.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace raw SQL queries that use the emailadd parameter with parameterized queries or stored procedures to eliminate injection points.
  • Require HTTPS for the login endpoint and apply network or application-level access controls to limit exposure to trusted users and IP ranges.
  • Monitor authentication logs for abnormal query patterns and implement rate limiting or IP blocking for repeated failed login attempts.

Generated by OpenCVE AI on April 18, 2026 at 08:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Product Reservation System
CPEs cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Product Reservation System

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Product Reservation System
Vendors & Products Code-projects
Code-projects online Product Reservation System

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Online Product Reservation System 1.0. This vulnerability affects unknown code of the file app/user/login.php of the component User Login. The manipulation of the argument emailadd results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Online Product Reservation System User Login login.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Product Reservation System
Fabian Online Product Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:13:53.983Z

Reserved: 2026-01-04T07:01:36.899Z

Link: CVE-2026-0583

cve-icon Vulnrichment

Updated: 2026-01-05T20:40:38.509Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T10:15:58.270

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses