Description
A vulnerability was determined in code-projects Online Music Site 1.0. Affected is an unknown function of the file /Administrator/PHP/AdminDeleteCategory.php. Executing a manipulation of the argument ID can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection allowing unauthorized database access or modification
Action: Immediate Patch
AI Analysis

Impact

A SQL injection vulnerability resides in the AdminDeleteCategory.php script within the Online Music Site. The flaw arises when an attacker supplies a crafted value for the ID parameter, enabling malicious SQL statements to be executed against the database. This can lead to data exfiltration, deletion, or modification, jeopardizing confidentiality, integrity, and potentially availability of the site’s data if the attacker expands the attack to disrupt application logic.

Affected Systems

The affected system is the code-projects Online Music Site version 1.0. The vulnerability is located in the /Administrator/PHP/AdminDeleteCategory.php file and is present in the default distribution of the site.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate risk, and the EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. However, the attack vector is remote and publicly disclosed, meaning an attacker can exploit it without needing prior access. Because the vulnerability is not listed in the CISA KEV catalog, it is not yet identified as a known highly-exploited vulnerability, but it remains exploitable through unsanitized input in a publicly accessible administrative interface.

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the application to a patched release that sanitizes or parameterizes the ID input for AdminDeleteCategory.php
  • Configure the administrative section to require authentication and role‑based access control so only authorized personnel can access the delete functionality
  • Implement input validation or use prepared statements to ensure the ID value does not contain executable SQL code

Generated by OpenCVE AI on April 17, 2026 at 21:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Music Site
CPEs cpe:2.3:a:fabian:online_music_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Music Site

Mon, 09 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Music Site
Vendors & Products Code-projects
Code-projects online Music Site

Mon, 09 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Online Music Site 1.0. Affected is an unknown function of the file /Administrator/PHP/AdminDeleteCategory.php. Executing a manipulation of the argument ID can lead to sql injection. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized.
Title code-projects Online Music Site AdminDeleteCategory.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Music Site
Fabian Online Music Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:55:40.507Z

Reserved: 2026-02-08T08:17:25.094Z

Link: CVE-2026-2211

cve-icon Vulnrichment

Updated: 2026-02-09T16:22:27.785Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T04:15:50.623

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2211

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses