Description
A vulnerability was detected in code-projects Simple Flight Ticket Booking System 1.0. Affected is an unknown function of the file /Adminupdate.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
Published: 2026-03-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database Compromise
Action: Patch
AI Analysis

Impact

A SQL injection flaw was found in the Adminupdate.php entry point of the Simple Flight Ticket Booking System 1.0. Malicious manipulation of parameters such as flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, and bp enables an attacker to inject arbitrary SQL statements, potentially exposing, altering, or deleting sensitive data. The weakness maps to CWE‑89 and CWE‑74, reflecting unsanitized input leading to SQL and URL parameter injection.

Affected Systems

The affected product is code‑projects Simple Flight Ticket Booking System version 1.0, with the vulnerability localized to the /Adminupdate.php file. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, while the EPSS score is less than 1%, suggesting a low current exploitation probability. The flaw can be triggered remotely through crafted HTTP requests that target the exposed parameters, and no authentication is required according to the description, which raises the risk of public exploitation. Although it is not listed in the CISA KEV catalog, administrators should treat the vulnerability seriously and remediate promptly.

Generated by OpenCVE AI on April 16, 2026 at 04:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‐released patch that addresses the SQL injection in Adminupdate.php
  • Implement input validation and parameterized queries for all database interactions within Adminupdate.php
  • Enforce authentication and restrict access to Adminupdate.php so that only authorized administrators can submit data

Generated by OpenCVE AI on April 16, 2026 at 04:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Flight Ticket Booking System
CPEs cpe:2.3:a:carmelo:simple_flight_ticket_booking_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Flight Ticket Booking System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Flight Ticket Booking System
Vendors & Products Code-projects
Code-projects simple Flight Ticket Booking System

Sun, 08 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Simple Flight Ticket Booking System 1.0. Affected is an unknown function of the file /Adminupdate.php. The manipulation of the argument flightno/airplaneid/departure/dtime/arrival/atime/ec/ep/bc/bp results in sql injection. The attack can be executed remotely. The exploit is now public and may be used.
Title code-projects Simple Flight Ticket Booking System Adminupdate.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Flight Ticket Booking System
Code-projects Simple Flight Ticket Booking System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T14:36:01.790Z

Reserved: 2026-03-07T09:12:58.721Z

Link: CVE-2026-3711

cve-icon Vulnrichment

Updated: 2026-03-11T14:35:47.841Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T06:16:11.260

Modified: 2026-03-09T16:16:51.423

Link: CVE-2026-3711

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:30:13Z

Weaknesses