Description
A vulnerability was identified in code-projects Online Music Site 1.0. Affected by this vulnerability is an unknown functionality of the file /Administrator/PHP/AdminEditCategory.php. The manipulation of the argument ID leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Published: 2026-02-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection affecting the admin interface
Action: Patch Immediately
AI Analysis

Impact

The flaw resides in the AdminEditCategory.php page of code‑projects Online Music Site 1.0. An attacker can manipulate the ID parameter sent to the script, which is included directly in an SQL query without proper sanitization. This permits arbitrary SQL commands to be executed on the database, enabling data exfiltration, modification, or deletion. The weakness is identified as CWE‑74 and CWE‑89.

Affected Systems

Affected systems are deployments of the code‑projects Online Music Site 1.0. The vulnerability exists in the Administrator/PHP/AdminEditCategory.php file of this version. Only installations running this exact release are at risk; newer or patched versions may no longer contain the flaw.

Risk and Exploitability

The CVSS base score is 6.9, indicating a moderate severity impact on confidentiality and integrity. The EPSS score is below 1%, suggesting a low probability of exploitation in the wild, yet the vulnerability is publicly available and can be triggered from a remote location. No CVE is listed in the CISA KEV catalogue, implying limited known exploitation, but the potential for damage remains if an attacker gains administrative access.

Generated by OpenCVE AI on April 17, 2026 at 21:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest patched version of Online Music Site if a vendor release is available.
  • Restrict access to the Administrator/PHP/AdminEditCategory.php page to authenticated, authorized administrators and consider applying IP‑based restrictions.
  • Validate the ID parameter to ensure it contains only numeric characters and use parameterized queries or prepared statements to prevent SQL injection.

Generated by OpenCVE AI on April 17, 2026 at 21:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Fabian
Fabian online Music Site
CPEs cpe:2.3:a:fabian:online_music_site:1.0:*:*:*:*:*:*:*
Vendors & Products Fabian
Fabian online Music Site

Mon, 09 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Music Site
Vendors & Products Code-projects
Code-projects online Music Site

Mon, 09 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Online Music Site 1.0. Affected by this vulnerability is an unknown functionality of the file /Administrator/PHP/AdminEditCategory.php. The manipulation of the argument ID leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.
Title code-projects Online Music Site AdminEditCategory.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Music Site
Fabian Online Music Site
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:55:52.755Z

Reserved: 2026-02-08T08:17:33.213Z

Link: CVE-2026-2212

cve-icon Vulnrichment

Updated: 2026-02-09T16:20:08.556Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T04:15:50.810

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2212

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses