Description
A flaw has been found in code-projects Accounting System 1.0. Affected by this issue is some unknown functionality of the file /edit_costumer.php of the component Parameter Handler. This manipulation of the argument cos_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-03-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw was discovered in code-projects Accounting System 1.0. The file edit_costumer.php accepts the parameter cos_id without proper validation, which allows an attacker to inject arbitrary SQL. By manipulating this argument, an attacker can retrieve, alter, or delete database records, potentially exposing sensitive customer information or tampering with financial data. The weakness arises from inadequate input handling, consistent with CWE-74 and CWE-89.

Affected Systems

The vulnerability affects the code-projects Accounting System, version 1.0, specifically the Parameter Handler component that processes the edit_costumer.php script. No other versions or products are mentioned in the available data.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is exploitable remotely, and a published exploit demonstrates its feasibility. It is not listed in the CISA KEV catalog, but the existence of publicly available code implies that knowledgeable adversaries could target affected installations.

Generated by OpenCVE AI on March 30, 2026 at 20:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-provided patch or upgrade to a fixed version of Accounting System.
  • If a patch is unavailable, limit access to /edit_costumer.php or enforce numeric validation on the cos_id parameter.
  • Monitor database logs for abnormal queries or changes.
  • Check the vendor’s security advisories for updates or mitigation guidance.

Generated by OpenCVE AI on March 30, 2026 at 20:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Sherlock
Sherlock accounting System
CPEs cpe:2.3:a:sherlock:accounting_system:1.0:*:*:*:*:*:*:*
Vendors & Products Sherlock
Sherlock accounting System

Mon, 30 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects accounting System
Vendors & Products Code-projects
Code-projects accounting System

Sun, 29 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in code-projects Accounting System 1.0. Affected by this issue is some unknown functionality of the file /edit_costumer.php of the component Parameter Handler. This manipulation of the argument cos_id causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title code-projects Accounting System Parameter edit_costumer.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Accounting System
Sherlock Accounting System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T14:52:42.940Z

Reserved: 2026-03-27T16:11:06.045Z

Link: CVE-2026-5034

cve-icon Vulnrichment

Updated: 2026-03-30T13:14:11.598Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T06:16:12.870

Modified: 2026-03-30T18:59:37.200

Link: CVE-2026-5034

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:53Z

Weaknesses