Description
A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Handler. Such manipulation of the argument id/qty leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2026-01-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

A software flaw in the 1.0 release of code‑projects Online Product Reservation System permits an attacker to supply crafted id and qty values to the /app/checkout/update.php handler, leading to a SQL injection vulnerability (CWE‑74 and CWE‑89). Because the input is not properly validated before being incorporated into SQL statements, an attacker can execute arbitrary database commands, potentially exposing order details or altering stored records and compromising confidentiality or integrity of transaction data.

Affected Systems

The affected product is code‑projects Online Product Reservation System version 1.0. Systems that expose the /app/checkout/update.php endpoint as part of the cart update handler are at risk. Administrators should verify whether their deployments are using this exact version and whether the vulnerable file is publicly accessible.

Risk and Exploitability

The reported CVSS score of 5.3 indicates moderate severity. The EPSS rating shows that the likelihood of exploitation is low (less than 1%) and the issue is not listed in CISA’s KEV catalog. The vulnerability can be triggered remotely by an external actor through HTTP requests to the vulnerable endpoint. Public proof‑of‑concept code is available, suggesting that an attacker could exploit the flaw from outside the network without elevated credentials.

Generated by OpenCVE AI on April 18, 2026 at 20:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a version of Online Product Reservation System that addresses the SQL injection flaw.
  • Modify the cart update code so that id and qty parameters are bound as integers or validated against numeric ranges before being used in SQL statements.
  • Deploy defensive controls such as a web application firewall or request filtering that blocks suspicious SQL injection patterns targeting the update endpoint.

Generated by OpenCVE AI on April 18, 2026 at 20:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 09 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Product Reservation System
CPEs cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Product Reservation System

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Product Reservation System
Vendors & Products Code-projects
Code-projects online Product Reservation System

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Handler. Such manipulation of the argument id/qty leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title code-projects Online Product Reservation System Cart Update update.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Product Reservation System
Fabian Online Product Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:19:12.774Z

Reserved: 2026-01-04T18:06:39.699Z

Link: CVE-2026-0591

cve-icon Vulnrichment

Updated: 2026-01-05T20:07:50.583Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T14:15:54.507

Modified: 2026-01-09T14:59:07.417

Link: CVE-2026-0591

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T20:30:09Z

Weaknesses