Impact
A weakness has been identified in the Simple Flight Ticket Booking System’s register.php. Manipulating the Username field allows an attacker to inject arbitrary SQL statements, a classic example of CWE‑89 (SQL Injection) and CWE‑74 (SQL Syntax Error) weaknesses. This can result in confidential data being disclosed, modified, or deleted, and may also provide a foothold for further attacks on the database or application whatsoever.
Affected Systems
The vulnerability affects the Code‑Projects Simple Flight Ticket Booking System version 1.0, specifically the register.php endpoint. No other versions or components are listed as affected in the available data.
Risk and Exploitability
The CVSS score is 6.9, indicating a medium‑to‑high impact severity. The EPSS score is below 1%, suggesting a low probability of exploitation in the foreseeable future, and the vulnerability is not listed in the CISA KEV catalog. Attackers can launch this vulnerability remotely by submitting crafted Username values, and the existence of public exploit code confirms its practicality.
OpenCVE Enrichment