Description
A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-03-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw exists in the Accounting System’s view_work.php file that allows an attacker to supply a crafted value for the en_id parameter. The manipulation of this input enables a classic SQL injection, which can lead to unauthorized data exposure, data modification, or account compromise. The weakness is rooted in improper handling of user-supplied data, matching the CWE-74 and CWE-89 classes of web application vulnerabilities. The impact is limited to the data accessed through the vulnerable endpoint but can be significant if sensitive accounting records are retrievable or tampered with.

Affected Systems

The vulnerability affects the code‑projects Accounting System, specifically any installation of version 1.0 as identified by the component Parameter Handler in view_work.php. No other versions are confirmed to be impacted based on the provided information.

Risk and Exploitability

The CVSS score of 6.9 places the flaw in the medium to high severity range, while the EPSS score of less than 1% indicates a low probability of exploitation under current conditions. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known public exploitation campaigns. Attackers can exploit the flaw remotely through a web request that targets the en_id argument, potentially gaining database access if proper defensive controls are absent. The risk is primarily contingent on the application’s exposure to untrusted input and the security posture of the underlying database.

Generated by OpenCVE AI on March 30, 2026 at 20:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website for an official patch or update that addresses the SQL injection flaw.
  • If no patch is available, restrict direct access to the /view_work.php endpoint or enforce strict authentication for its use.
  • Sanitize and validate the en_id parameter, or replace direct queries with parameterized statements to eliminate injection risk.
  • Deploy web application firewall rules that detect and block typical SQL injection payloads targeting the en_id field.
  • Ensure the database user account used by the application has the minimum privileges required for its operations.

Generated by OpenCVE AI on March 30, 2026 at 20:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Sherlock
Sherlock accounting System
CPEs cpe:2.3:a:sherlock:accounting_system:1.0:*:*:*:*:*:*:*
Vendors & Products Sherlock
Sherlock accounting System

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects accounting System
Vendors & Products Code-projects
Code-projects accounting System

Sun, 29 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Accounting System 1.0. This affects an unknown part of the file /view_work.php of the component Parameter Handler. Such manipulation of the argument en_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Accounting System Parameter view_work.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Accounting System
Sherlock Accounting System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T15:52:58.977Z

Reserved: 2026-03-27T16:13:42.461Z

Link: CVE-2026-5035

cve-icon Vulnrichment

Updated: 2026-03-30T15:52:53.264Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T07:15:56.793

Modified: 2026-03-30T18:59:03.920

Link: CVE-2026-5035

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:52Z

Weaknesses