Description
A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file /delete_post.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-07
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch
AI Analysis

Impact

A flaw in the delete_post.php functionality allows an attacker to inject arbitrary SQL through the ID parameter. This remote input can modify the intended query, giving the attacker database access and the ability to read or alter data. The weakness is an improper input handling that leads to SQL injection, a notable risk on confidentiality and integrity.

Affected Systems

The vulnerability exists in the Code-Projects Social Networking Site, specifically version 1.0, within the /delete_post.php file. The affected component is an unknown function that processes the ID argument for post deletion. Only the 1.0 release is documented as vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the EPSS score is less than 1 %, implying a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it by sending a crafted ID value to the public delete_post.php endpoint, achieving remote SQL injection without requiring local privileges.

Generated by OpenCVE AI on April 17, 2026 at 22:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Code-Projects Social Networking Site to a patched version that fixes the delete_post.php injection flaw.
  • If an immediate update is not available, restrict access to delete_post.php to authenticated administrators only and remove any public delete privileges.
  • Validate the ID parameter on the server side, ensuring it contains only numeric characters, and use prepared statements or parameterized queries instead of string concatenation when interacting with the database.

Generated by OpenCVE AI on April 17, 2026 at 22:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:social_networking_site:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:social_networking_site:1.0:*:*:*:*:*:*:*

Wed, 11 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects social Networking Site
Vendors & Products Code-projects
Code-projects social Networking Site

Sat, 07 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file /delete_post.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Social Networking Site delete_post.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Social Networking Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:31:30.099Z

Reserved: 2026-02-06T08:10:18.338Z

Link: CVE-2026-2083

cve-icon Vulnrichment

Updated: 2026-02-10T15:43:24.623Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-07T11:16:06.750

Modified: 2026-02-12T16:22:26.053

Link: CVE-2026-2083

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses