Description
A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the file /my_account/delete.php. Performing a manipulation of the argument cos_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-03-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection enabling unauthorized data manipulation
Action: Patch immediately
AI Analysis

Impact

An unchecked parameter named cos_id in the delete.php file allows an attacker to inject arbitrary SQL statements. The malicious input is inserted directly into a database query without sanitization or parameter binding, putting the system at risk of data theft, modification or deletion. The vulnerability is classified as both a classic SQL injection (CWE-89) and an unsafe construction of database queries (CWE-74).

Affected Systems

The issue exists in the code‑projects Accounting System version 1.0. No additional releases or product variants are listed as affected, and the problem is tied specifically to the delete.php endpoint.

Risk and Exploitability

The CVSS‑Base score of 5.3 indicates medium severity, reflecting that the flaw does not grant immediate code execution or widespread privilege escalation but does expose critical financial data. An exploit is currently public and can be triggered via an HTTP request from outside the network. No exploit‑probability score is available, and the vulnerability is not listed in the known‑exploited‑vulnerabilities catalog, suggesting limited widespread attention. The attack path requires access to the delete.php resource and the ability to supply a crafted cos_id value; no special credentials are needed.

Generated by OpenCVE AI on March 26, 2026 at 04:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade to a fixed release of the Accounting System
  • If a patch is unavailable, refactor delete.php to use prepared statements and validate cos_id as a numeric identifier
  • Restrict access to delete.php so that only authenticated users with appropriate authorization can invoke it
  • Monitor server logs for requests containing SQL meta‑characters and block offending IP addresses

Generated by OpenCVE AI on March 26, 2026 at 04:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects accounting System
Vendors & Products Code-projects
Code-projects accounting System

Thu, 26 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the file /my_account/delete.php. Performing a manipulation of the argument cos_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title code-projects Accounting System delete.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Accounting System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T18:19:57.374Z

Reserved: 2026-03-25T14:24:26.604Z

Link: CVE-2026-4836

cve-icon Vulnrichment

Updated: 2026-03-26T18:19:54.399Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-26T03:16:04.587

Modified: 2026-03-30T13:26:50.827

Link: CVE-2026-4836

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:08:49Z

Weaknesses