Description
A vulnerability was determined in code-projects Online Product Reservation System 1.0. The affected element is an unknown function of the file /app/checkout/delete.php of the component POST Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

An SQL injection flaw was discovered in the delete.php file of the code‑projects Online Product Reservation System version 1.0. An attacker can inject arbitrary SQL via the ID field that the application trusts without sanitization, causing the backend database to execute unintended commands. This potentially allows the attacker to read, modify, or delete data in the reservation tables, which could compromise customer records, financial information, and operational integrity.

Affected Systems

The vulnerability affects the code‑projects Online Product Reservation System, specifically version 1.0. All installations of this application that process POST requests to /app/checkout/delete.php are impacted. No other product versions are mentioned.

Risk and Exploitability

The CVSS v3.1 score is 5.3, indicating medium severity. EPSS is reported as less than 1 %, suggesting low but non‑zero exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, implying it has not been identified as a widely active exploit. The attack can be carried out remotely by sending a crafted HTTP POST request to the delete endpoint; the description does not mention authentication requirements, so the risk could be mitigated only if the application enforces user sessions before processing the ID.

Generated by OpenCVE AI on April 18, 2026 at 08:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade to a fixed version of the Online Product Reservation System, if one is released by code‑projects.
  • Validate and sanitize the ID parameter on the server side, ensuring it is an integer and contains no SQL control characters.
  • Refactor database access code to use prepared statements or parameterized queries that separate data from code.

Generated by OpenCVE AI on April 18, 2026 at 08:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Product Reservation System
CPEs cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Product Reservation System

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Product Reservation System
Vendors & Products Code-projects
Code-projects online Product Reservation System

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Online Product Reservation System 1.0. The affected element is an unknown function of the file /app/checkout/delete.php of the component POST Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
Title code-projects Online Product Reservation System POST Parameter delete.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Product Reservation System
Fabian Online Product Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:18:59.902Z

Reserved: 2026-01-04T18:06:36.738Z

Link: CVE-2026-0590

cve-icon Vulnrichment

Updated: 2026-01-05T20:08:44.907Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T13:15:55.643

Modified: 2026-01-09T15:07:02.847

Link: CVE-2026-0590

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses