Description
SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries and retrieve sensitive user data.
Published: 2026-04-20
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Disclosure via SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a classic SQL injection flaw located in the email parameter of the forgot password page of the Apartment Visitors Management System V1.1. An attacker can insert malicious SQL code into that field, which the application passes directly to the database without validation or parameterization. This allows the attacker to read or modify sensitive data stored in the backend MySQL database, potentially exposing user credentials, personal information, or other confidential records. The weakness is a direct injection of untrusted input into a SQL statement, identified as a standard SQL Injection vulnerability.

Affected Systems

The affected product is Apartment Visitors Management System version 1.1, a PHP/MySQL web application used for managing visitor access to apartment complexes. No vendor is listed, but the codebase is publicly available in GitHub repositories linked in the references. It appears to be a typical small‑scale application deployed on a web server with a MySQL database.

Risk and Exploitability

The CVE has a CVSS score of 7.5, indicating elevated severity. SQL injection is universally considered a high‑risk flaw because it permits unauthenticated attackers to extract or manipulate arbitrary data from the database. Attackers can trigger the flaw remotely by sending a crafted request to the forgot‑password.php page, so the vulnerability is exploitable over the network by anyone who can reach the web server. As it is not listed in the CISA KEV catalog, there is no evidence of active exploitation in the wild at the time of this analysis, but the combination of remote reachability and high information‑leak potential warrants immediate remediation.

Generated by OpenCVE AI on April 21, 2026 at 00:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the application to a patched release that addresses the SQL injection flaw. If no patch is available, replace the email input handling in forgot-password.php with prepared statements or a proper escaping routine.
  • Implement input validation rules that reject or sanitize any SQL meta‑characters before passing the value to the database.
  • Configure a web application firewall or intrusion detection system to detect and block SQL injection attempts targeting the forgot‑password.php endpoint.

Generated by OpenCVE AI on April 21, 2026 at 00:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title SQL Injection Vulnerability in Apartment Visitors Management System Forgot Password Page

Mon, 20 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Mon, 20 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries and retrieve sensitive user data.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-20T18:12:54.038Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-39111

cve-icon Vulnrichment

Updated: 2026-04-20T18:12:27.665Z

cve-icon NVD

Status : Deferred

Published: 2026-04-20T18:16:27.263

Modified: 2026-04-20T18:51:43.663

Link: CVE-2026-39111

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:15:16Z

Weaknesses