Impact
A flaw in the Admindelete.php file of code-projects Simple Flight Ticket Booking System 1.0 allows attackers to manipulate the flightno argument, resulting in SQL injection. This could permit an adversary to read, alter, or delete flight booking data, compromising the confidentiality, integrity, and availability of the database. The vulnerability is classified under CWE‑74 (Improper Handling of Special Elements in SQL Statements) and CWE‑89 (Improper Neutralization of Special Elements used in an SQL Command).
Affected Systems
The affected product is code-projects Simple Flight Ticket Booking System, version 1.0. No other vendors or product versions are listed as impacted.
Risk and Exploitability
A remote attacker can exploit the flaw over the network. The CVSS score of 6.9 indicates a moderate risk, while the EPSS score of less than 1% suggests very low exploitation probability. The vulnerability is not currently listed in CISA’s KEV catalog. Attackers would need to supply a crafted flightno parameter to inject malicious SQL, indicating a web‑based attack path.
OpenCVE Enrichment