Description
A vulnerability was found in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the component Administration Backend. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-01-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper authentication allows attackers to acquire administrative privileges
Action: Patch Immediately
AI Analysis

Impact

A flaw in the administration backend of code‑projects Online Product Reservation System version 1.0 permits an attacker to bypass authentication by manipulating an unknown function. The vulnerability enables unauthorized users to perform administrative actions, as the check enforcing valid credentials is ineffective. The flaw is exploitable remotely and has been demonstrated publicly by an evident proof‑of‑concept.

Affected Systems

The affected product is code‑projects Online Product Reservation System 1.0, specifically the Administration Backend component that relies on the undocumented authentication function. No other versions or components are confirmed to be impacted at this time.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the EPSS value of less than 1% suggests a low probability of active exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can remotely exploit the weakness by sending crafted requests that trigger the unauthorized access path, ultimately gaining full administrative control.

Generated by OpenCVE AI on April 18, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact the code‑projects maintainers or review the project’s repository for a patch that addresses the authentication bypass and apply it as soon as it becomes available.
  • If a patch is not immediately available, block or tightly restrict direct HTTP access to the administration backend using firewall rules or web server configuration (for example, with .htaccess or IP whitelisting) and enforce stronger authentication such as multi‑factor authentication.
  • Continuously monitor authentication logs and access patterns for suspicious activity, and consider disabling or temporarily removing the vulnerable function until a secure fix is deployed.

Generated by OpenCVE AI on April 18, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Product Reservation System
CPEs cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Product Reservation System

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Product Reservation System
Vendors & Products Code-projects
Code-projects online Product Reservation System

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the component Administration Backend. The manipulation results in improper authentication. The attack may be performed from remote. The exploit has been made public and could be used.
Title code-projects Online Product Reservation System Administration Backend improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Product Reservation System
Fabian Online Product Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:18:46.151Z

Reserved: 2026-01-04T18:06:27.713Z

Link: CVE-2026-0589

cve-icon Vulnrichment

Updated: 2026-01-05T21:14:48.735Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T13:15:55.457

Modified: 2026-01-09T15:05:04.390

Link: CVE-2026-0589

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses