Description
A vulnerability was detected in code-projects Intern Membership Management System 1.0. Impacted is an unknown function of the file /intern/admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Published: 2026-01-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Data Access
Action: Apply Patch
AI Analysis

Impact

The Intern Membership Management System 1.0 has a flaw in the add_activity.php file that allows an attacker to manipulate the Title parameter and inject arbitrary SQL commands. This SQL injection can be executed remotely and may allow the attacker to read, modify, or delete database records, compromising confidentiality and integrity of the system data. The weakness corresponds to CWE-89 and is further facilitated by the parameter handling described in CWE-74.

Affected Systems

The vulnerability affects the Intern Membership Management System 1.0 developed by code-projects. No other versions or related products are listed as affected.

Risk and Exploitability

The CVSS score of 5.1 indicates a medium severity risk, while the EPSS score of less than 1% suggests a low but non‑zero likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Attackers can reach the vulnerable point via a web form that accepts the Title argument, making remote exploitation possible for anyone who can access the application. If the database account used by the application has sufficient privileges, the consequences could include unauthorized data disclosure or tampering.

Generated by OpenCVE AI on April 18, 2026 at 07:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any vendor‑issued patch for Intern Membership Management System 1.0
  • Validate and sanitize the Title input to remove unintended SQL control characters
  • Implement prepared statements or parameterized queries for database access
  • Restrict database user privileges to the minimum necessary functions
  • Configure web application firewall rules to block suspicious input patterns

Generated by OpenCVE AI on April 18, 2026 at 07:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 22 Jan 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo intern Membership Management System
CPEs cpe:2.3:a:carmelo:intern_membership_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo intern Membership Management System

Fri, 09 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects intern Membership Management System
Vendors & Products Code-projects
Code-projects intern Membership Management System

Thu, 08 Jan 2026 21:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Intern Membership Management System 1.0. Impacted is an unknown function of the file /intern/admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.
Title code-projects Intern Membership Management System add_activity.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Intern Membership Management System
Code-projects Intern Membership Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:24:00.544Z

Reserved: 2026-01-08T15:08:19.848Z

Link: CVE-2026-0729

cve-icon Vulnrichment

Updated: 2026-01-09T18:13:56.707Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-08T22:16:02.560

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-0729

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T07:45:24Z

Weaknesses