Description
A vulnerability was found in code-projects Simple Blood Donor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /simpleblooddonor/editcampaignform.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Data Compromise)
Action: Apply Patch
AI Analysis

Impact

The vulnerability is located in the file editcampaignform.php of Simple Blood Donor Management System 1.0. Manipulating the ID parameter allows an attacker to inject arbitrary SQL commands into the database query, enabling read, modify, or delete operations on donor and campaign data. This weakness corresponds to the classic SQL injection flaw identified as CWE-74 and CWE-89.

Affected Systems

The affected product is the Simple Blood Donor Management System version 1.0 from the vendor code-projects. No other version or vendor information is provided.

Risk and Exploitability

The CVSS score of 6.9 signals a moderate to high severity, while the EPSS score of less than 1% indicates a low but nonzero probability of exploitation. The vulnerability can be triggered remotely via the web interface without requiring elevated privileges, and it is not listed in the CISA KEV catalog. The reported exploit is publicly available and could be used against any exposed instance of the application.

Generated by OpenCVE AI on April 17, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Replace editcampaignform.php with the vendor’s latest patch that properly sanitizes the ID parameter or uses parameterized queries.
  • If a patch is not available, restrict access to the file by requiring authentication or moving it outside the web root.
  • Deploy a web application firewall to detect and block SQL injection attempts targeting the ID parameter.
  • Review and update all application input handling to ensure user-supplied data is correctly escaped or parameterized.

Generated by OpenCVE AI on April 17, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian simple Blood Donor Management System
CPEs cpe:2.3:a:fabian:simple_blood_donor_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian simple Blood Donor Management System

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Blood Donor Management System
Vendors & Products Code-projects
Code-projects simple Blood Donor Management System

Fri, 06 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Simple Blood Donor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /simpleblooddonor/editcampaignform.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
Title code-projects Simple Blood Donor Management System editcampaignform.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Blood Donor Management System
Fabian Simple Blood Donor Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:26:29.368Z

Reserved: 2026-02-06T06:32:59.555Z

Link: CVE-2026-2060

cve-icon Vulnrichment

Updated: 2026-02-06T18:01:42.466Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T18:16:00.320

Modified: 2026-02-11T19:04:29.427

Link: CVE-2026-2060

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:45:29Z

Weaknesses