Impact
An attacker can manipulate the activity_id parameter in delete_activity.php to inject arbitrary SQL. The flaw is a classic formulation, matching CWE-74 and CWE-89, and can lead to unauthorized data exposure, alteration, or deletion via the database backend. The CVE description indicates the vulnerability exists in the public interface and that an exploit has been publicly disclosed.
Affected Systems
The affected product is Code-Projects Intern Membership Management System version 1.0. This web application is hosted by the vendor code‑projects and the vulnerable component resides in the admin interface at /admin/delete_activity.php.
Risk and Exploitability
With a CVSS score of 5.1 the vulnerability is considered moderate. However the EPSS score is below 1 % and it is not listed in the CISA KEV catalog, suggesting that current exploit activity is limited. The attack vector is remote; an unauthenticated user can send a crafted request to delete_activity.php with a malicious activity_id value to enable the injection. While no additional privileged access is explicitly required, the lack of authentication or input filtering raises the risk of accidental or intentional data compromise.
OpenCVE Enrichment