Description
A vulnerability was determined in code-projects Intern Membership Management System 1.0. Affected is an unknown function of the file /intern/admin/check_admin.php. Executing a manipulation of the argument Username can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-01-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection leading to unauthorized database access
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Intern Membership Management System’s check_admin.php file allows a malicious actor to manipulate the Username parameter and inject arbitrary SQL commands. The vulnerability permits remote exploitation, enabling an attacker to read, modify, or delete database records without authentication. The impact is the compromise of confidential data stored in the system’s backend.

Affected Systems

The affected product is code‑projects Intern Membership Management System, version 1.0. The vulnerability originates in the check_admin.php file located at /intern/admin/check_admin.php, a component of the system's administrative interface.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and an EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation. The issue is not listed in the CISA KEV catalog, yet it has been publicly disclosed and can be leveraged over the network. Because the attack relies on unsanitized user input, exploitation does not require privileged credentials and could be achieved by remote actors with network access to the application.

Generated by OpenCVE AI on April 18, 2026 at 16:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch or update to a fixed version when available
  • Use parameterized SQL queries or stored procedures to eliminate unsanitized input handling
  • Restrict access to /intern/admin/check_admin.php to authenticated administrators only, and enforce proper role‑based access controls

Generated by OpenCVE AI on April 18, 2026 at 16:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 12 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo intern Membership Management System
CPEs cpe:2.3:a:carmelo:intern_membership_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo intern Membership Management System

Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects intern Membership Management System
Vendors & Products Code-projects
Code-projects intern Membership Management System

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Intern Membership Management System 1.0. Affected is an unknown function of the file /intern/admin/check_admin.php. Executing a manipulation of the argument Username can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Title code-projects Intern Membership Management System check_admin.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Intern Membership Management System
Code-projects Intern Membership Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:23:23.648Z

Reserved: 2026-01-07T21:39:02.686Z

Link: CVE-2026-0700

cve-icon Vulnrichment

Updated: 2026-01-08T15:07:53.913Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T07:15:49.733

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0700

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z

Weaknesses