Description
A security vulnerability has been detected in code-projects Contact Management System 1.0. This issue affects some unknown processing of the file index.py. Such manipulation of the argument selecteditem[0] leads to sql injection. The attack can be executed remotely.
Published: 2026-02-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection allowing attackers to read or modify database content
Action: Apply Patch
AI Analysis

Impact

A vulnerability was identified in the index.py component of code-projects Contact Management System 1.0, where the argument selecteditem[0] is processed without proper sanitization, allowing a SQL injection flaw. The error is capitalized by the absence of input validation, aligning with common injection weaknesses. This flaw can be used by an unauthenticated attacker to execute arbitrary SQL statements against the underlying database, potentially exposing confidential data or modifying records.

Affected Systems

The affected product is code-projects Contact Management System, version 1.0.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, and there is no publicly disclosed exploitation. The attack vector is remote, as the flaw can be triggered by external requests to the application, with no special privileges required on the server side.

Generated by OpenCVE AI on April 18, 2026 at 13:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or repository for an official security update that addresses the index.py injection issue.
  • If no patch is available, immediately limit database permissions for the application account to the minimum required for functionality, reducing the impact of a successful injection.
  • Implement input validation and parameterized queries in the application’s data access code to eliminate the injection vector as a temporary workaround.

Generated by OpenCVE AI on April 18, 2026 at 13:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian contact Management System
CPEs cpe:2.3:a:fabian:contact_management_system:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian contact Management System

Mon, 09 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects contact Management System
Vendors & Products Code-projects
Code-projects contact Management System

Sun, 08 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Contact Management System 1.0. This issue affects some unknown processing of the file index.py. Such manipulation of the argument selecteditem[0] leads to sql injection. The attack can be executed remotely.
Title code-projects Contact Management System index.py sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:ND/RL:ND/RC:ND'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:X/RL:X/RC:X'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Code-projects Contact Management System
Fabian Contact Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:47:16.153Z

Reserved: 2026-02-07T15:00:18.402Z

Link: CVE-2026-2176

cve-icon Vulnrichment

Updated: 2026-02-09T17:44:37.745Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-08T19:16:21.950

Modified: 2026-02-11T18:37:50.497

Link: CVE-2026-2176

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses