Description
A vulnerability was identified in code-projects Intern Membership Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /intern/admin/add_admin.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Published: 2026-01-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to unauthorized data manipulation
Action: Patch ASAP
AI Analysis

Impact

A web application built with Intern Membership Management System version 1.0 contains a flaw in add_admin.php where the Username argument is not sanitized. This flaw permits attackers to inject arbitrary SQL statements into database queries, enabling unauthorized data disclosure, modification, or escalation of privileges.

Affected Systems

The vulnerability exists in Intern Membership Management System version 1.0, released by code-projects. It affects installations that expose the /intern/admin/add_admin.php page, including standalone deployments referenced in the cpe identifier.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS score of less than 1% signals a low current exploitation probability, but the exploit is publicly available. The vulnerability is not yet catalogued in CISA's KEV list. An attacker can exploit it remotely by submitting a crafted Username field through the web interface, which is then executed as raw SQL. If successful, the attacker could add administrative users or read sensitive data if appropriate database permissions exist.

Generated by OpenCVE AI on April 18, 2026 at 07:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's official patch that sanitizes the Username input in add_admin.php or upgrade to a newer version where the issue is fixed.
  • Enable input validation or use parameterized queries for all database interactions, ensuring that any value supplied to Username is properly escaped or bound.
  • Restrict access to the add_admin.php page to authenticated administrators only, and consider placing the admin interface behind a secure VPN or firewall.
  • Deploy a Web Application Firewall that filters out common SQL injection patterns on that endpoint.

Generated by OpenCVE AI on April 18, 2026 at 07:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 08:30:00 +0000

Type Values Removed Values Added
References

Thu, 15 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo intern Membership Management System
CPEs cpe:2.3:a:carmelo:intern_membership_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo intern Membership Management System

Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects intern Membership Management System
Vendors & Products Code-projects
Code-projects intern Membership Management System

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Intern Membership Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /intern/admin/add_admin.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Title code-projects Intern Membership Management System add_admin.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Intern Membership Management System
Code-projects Intern Membership Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:23:36.563Z

Reserved: 2026-01-07T21:39:05.268Z

Link: CVE-2026-0701

cve-icon Vulnrichment

Updated: 2026-01-08T14:46:20.272Z

cve-icon NVD

Status : Modified

Published: 2026-01-08T08:15:45.450

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0701

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:00:05Z

Weaknesses