Description
A vulnerability was found in code-projects Intern Membership Management System 1.0. This impacts an unknown function of the file /intern/admin/edit_activity.php. Performing a manipulation of the argument activity_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Published: 2026-01-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Fix
AI Analysis

Impact

A vulnerability exists in the Intern Membership Management System version 1.0 that allows an external actor to manipulate the activity_id parameter in edit_activity.php. By submitting crafted input, an attacker can trigger an SQL injection that permits arbitrary SQL statements to be executed against the underlying database. This can result in unauthorized disclosure or alteration of data stored by the application.

Affected Systems

The affected product is Intern Membership Management System from code‑projects, version 1.0, specifically the file /intern/admin/edit_activity.php. The injection is tied to the activity_id argument used within the administrative interface.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.1, indicating moderate severity. The EPSS score is below 1%, reflecting a low probability of exploitation at present, although the exploitation code has been made public. The vulnerability is not listed in CISA’s KEV catalog. Attackers can reach the vulnerable endpoint over the network; remote exploitation is possible, and without mitigation an attacker could inject SQL commands that compromise database confidentiality and integrity.

Generated by OpenCVE AI on April 18, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace the vulnerable code with prepared statements or stored procedures that use parameterized queries for the activity_id value.
  • Validate and sanitize any user-supplied activity_id input before it is sent to the database, rejecting non‑numeric or malformed values.
  • Restrict access to the /admin path so that only authenticated and authorized users can invoke edit_activity.php, optionally employing IP whitelisting or multi‑factor authentication.

Generated by OpenCVE AI on April 18, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo intern Membership Management System
CPEs cpe:2.3:a:carmelo:intern_membership_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo intern Membership Management System

Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects intern Membership Management System
Vendors & Products Code-projects
Code-projects intern Membership Management System

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 06:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Intern Membership Management System 1.0. This impacts an unknown function of the file /intern/admin/edit_activity.php. Performing a manipulation of the argument activity_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
Title code-projects Intern Membership Management System edit_activity.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Intern Membership Management System
Code-projects Intern Membership Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:23:09.830Z

Reserved: 2026-01-07T21:38:59.696Z

Link: CVE-2026-0699

cve-icon Vulnrichment

Updated: 2026-01-08T15:27:46.149Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T07:15:49.460

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0699

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z

Weaknesses