Description
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-08
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

A remote attacker can manipulate the Username field in the /login.php script of Simple Flight Ticket Booking System 1.0, resulting in a SQL injection vulnerability that allows arbitrary SQL code execution. The flaw is identified as CWE-74 (SQL injection via untrusted data passed into an SQL statement) and CWE-89 (SQL injection). Once the injection succeeds, the attacker can bypass authentication, read, modify, or delete database records without any additional privileges.

Affected Systems

The vulnerability affects code-projects Simple Flight Ticket Booking System version 1.0. No other product versions are listed in the CVE data.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate severity. The EPSS score of less than 1 % suggests the likelihood of exploitation is low currently, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Attackers can target the system over the public internet by sending specially crafted requests to the login.php endpoint with a manipulated Username value, without needing prior credentials.

Generated by OpenCVE AI on April 18, 2026 at 09:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official patch that sanitizes the Username input in /login.php or switches to parameterized queries.
  • If a patch is not yet available, replace the unsanitized SQL query in login.php with a prepared statement that binds the username as a parameter, preventing injection.
  • Deploy a web application firewall rule to detect and block SQL injection patterns specifically against the /login.php endpoint.

Generated by OpenCVE AI on April 18, 2026 at 09:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Flight Ticket Booking System
CPEs cpe:2.3:a:carmelo:simple_flight_ticket_booking_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Flight Ticket Booking System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Flight Ticket Booking System
Vendors & Products Code-projects
Code-projects simple Flight Ticket Booking System

Sun, 08 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argument Username results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Simple Flight Ticket Booking System login.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Flight Ticket Booking System
Code-projects Simple Flight Ticket Booking System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T14:11:44.083Z

Reserved: 2026-03-07T09:10:42.836Z

Link: CVE-2026-3708

cve-icon Vulnrichment

Updated: 2026-03-10T14:11:39.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T05:16:32.440

Modified: 2026-03-09T16:18:43.050

Link: CVE-2026-3708

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:45:25Z

Weaknesses