Description
A security vulnerability has been detected in code-projects Simple Flight Ticket Booking System 1.0. This impacts an unknown function of the file /Adminadd.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Published: 2026-03-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Remote)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Adminadd.php file of the Simple Flight Ticket Booking System 1.0, allowing an attacker to inject arbitrary SQL through flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, or bp parameters. This can lead to unauthorized data disclosure, data modification, or even deletion in the underlying database. The flaw stems from unsanitized input handling, matching CWE-74 and CWE-89.

Affected Systems

The affected product is code‑projects Simple Flight Ticket Booking System version 1.0. The official CPE identifier confirms the version. No other versions are listed as vulnerable.

Risk and Exploitability

The CVSS base score of 5.1 rates the issue as medium and the EPSS score of less than 1 % indicates a low likelihood of widespread exploitation. The vulnerability is not catalogued in the CISA KEV list. Exploitation is possible over the network and would require an attacker to craft input to the specified parameters via HTTP requests.

Generated by OpenCVE AI on April 16, 2026 at 10:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor patch or upgrade to a version of the Simple Flight Ticket Booking System that has the SQL injection fix applied.
  • Replace inline SQL statements in Adminadd.php with parameterized queries or prepared statements to ensure user input cannot alter query structure.
  • Validate and sanitize all user‑supplied parameters (flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, bp) before use.

Generated by OpenCVE AI on April 16, 2026 at 10:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Flight Ticket Booking System
CPEs cpe:2.3:a:carmelo:simple_flight_ticket_booking_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Flight Ticket Booking System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Flight Ticket Booking System
Vendors & Products Code-projects
Code-projects simple Flight Ticket Booking System

Sun, 08 Mar 2026 06:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple Flight Ticket Booking System 1.0. This impacts an unknown function of the file /Adminadd.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Title code-projects Simple Flight Ticket Booking System Adminadd.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Flight Ticket Booking System
Code-projects Simple Flight Ticket Booking System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T14:25:28.021Z

Reserved: 2026-03-07T09:12:55.413Z

Link: CVE-2026-3710

cve-icon Vulnrichment

Updated: 2026-03-10T14:25:00.980Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T06:16:11.053

Modified: 2026-03-09T16:17:06.217

Link: CVE-2026-3710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses