Description
A security flaw has been discovered in code-projects Contact Management System 1.0. This affects an unknown part of the component CRUD Endpoint. The manipulation of the argument ID results in improper authentication. The attack may be launched remotely.
Published: 2026-02-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Apply Patch
AI Analysis

Impact

The flaw exists in the CRUD endpoint of the code-projects Contact Management System 1.0, where an attacker can manipulate the ID argument to bypass authentication checks, enabling unauthorized access to contact records. The vulnerability is tied to CWE-287 and, according to the description, can be triggered remotely via crafted HTTP requests. The likely attack vector is malicious requests from a remote host. If exploited, an attacker could read, modify, or delete sensitive contact information, thereby compromising confidentiality, integrity, and potentially availability of the system.

Affected Systems

The affected product is the code-projects Contact Management System version 1.0. The vendor list and CPE string specify this single version, and no other versions or components are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 classifies the vulnerability as medium severity. The EPSS score is less than 1%, indicating a very low probability of exploitation in the wild at present. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the flaw can be exploited remotely through crafted HTTP requests that alter the ID argument, allowing an attacker to bypass authentication and gain unauthorized access to CRUD operations. While the exploitation probability is currently low, the potential impact on confidential contact data still warrants remediation.

Generated by OpenCVE AI on April 18, 2026 at 13:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s latest patch or upgrade to a fixed version of the Contact Management System.
  • Enforce authenticated sessions and IP whitelisting for all CRUD endpoints until a permanent fix is available.
  • Monitor HTTP traffic for repeated ID manipulation attempts and review logs for anomalous activity.

Generated by OpenCVE AI on April 18, 2026 at 13:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian contact Management System
CPEs cpe:2.3:a:fabian:contact_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian contact Management System

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects contact Management System
Vendors & Products Code-projects
Code-projects contact Management System

Sun, 08 Feb 2026 19:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Contact Management System 1.0. This affects an unknown part of the component CRUD Endpoint. The manipulation of the argument ID results in improper authentication. The attack may be launched remotely.
Title code-projects Contact Management System CRUD Endpoint improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:ND/RL:ND/RC:ND'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Code-projects Contact Management System
Fabian Contact Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:46:47.378Z

Reserved: 2026-02-07T14:57:19.836Z

Link: CVE-2026-2174

cve-icon Vulnrichment

Updated: 2026-02-09T17:57:27.371Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T19:16:21.597

Modified: 2026-02-11T18:39:15.483

Link: CVE-2026-2174

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses