Description
A security flaw has been discovered in code-projects Online Music Site 1.0. This issue affects some unknown processing of the file /Administrator/PHP/AdminUpdateCategory.php. The manipulation of the argument txtcat results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a remote SQL injection in the txtcat parameter of AdminUpdateCategory.php in code‑projects Online Music Site 1.0. The flaw permits an attacker to inject arbitrary SQL statements, potentially reading, modifying, or deleting data in the database. Because the affected page runs with administrative privileges, the impact could include full compromise of the site’s content and user data, as well as elevation of privileges. The weakness corresponds to CWE‑89 and can be accessed via unsanitized input injected as SQL.

Affected Systems

code‑projects Online Music Site, version 1.0.

Risk and Exploitability

The CVSS score is 6.9, indicating medium severity, while the EPSS score is below 1 %, suggesting a low exploitation likelihood at present. The vulnerability is not listed in the CISA KEV catalog. According to the description, the attack can be executed remotely by sending a crafted request to the /Administrator/PHP/AdminUpdateCategory.php endpoint, manipulating the txtcat parameter to inject malicious SQL. Publicly available exploits have been released, which raises the risk for any operational instance that has not yet been patched or mitigated.

Generated by OpenCVE AI on April 17, 2026 at 22:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Online Music Site to the latest release where the SQL injection bug is fixed.
  • Restrict access to /Administrator/PHP/AdminUpdateCategory.php so that only authenticated administrators can reach the page, using application authentication or network controls.
  • Ensure the txtcat input is validated and sent to the database via parameterized queries or prepared statements to eliminate unsanitized user data from SQL statements.

Generated by OpenCVE AI on April 17, 2026 at 22:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Music Site
CPEs cpe:2.3:a:fabian:online_music_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Music Site

Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Music Site
Vendors & Products Code-projects
Code-projects online Music Site

Sun, 08 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Online Music Site 1.0. This issue affects some unknown processing of the file /Administrator/PHP/AdminUpdateCategory.php. The manipulation of the argument txtcat results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Online Music Site AdminUpdateCategory.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Music Site
Fabian Online Music Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:37:23.183Z

Reserved: 2026-02-06T20:54:26.862Z

Link: CVE-2026-2132

cve-icon Vulnrichment

Updated: 2026-02-10T19:46:40.552Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T04:15:53.720

Modified: 2026-02-10T15:12:14.823

Link: CVE-2026-2132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T22:15:29Z

Weaknesses