Description
A security vulnerability has been detected in code-projects Simple Gym Management System 1.0. This vulnerability affects unknown code of the component Payment Handler. The manipulation of the argument Payment_id/Amount/customer_id/payment_type/customer_name leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Published: 2026-03-31
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data compromise via SQL injection
Action: Patch
AI Analysis

Impact

The vulnerability resides in the Payment Handler component of the Simple Gym Management System 1.0. Manipulating the Payment_id, Amount, customer_id, payment_type, or customer_name parameters allows a remote attacker to inject malicious SQL code. This can potentially grant unauthorized access to the database, expose confidential data, or allow further compromise of the application’s integrity. The weakness is identified as a classic SQL injection (CWE‑74, CWE‑89).

Affected Systems

Affected by the 1.0 release of the Simple Gym Management System from code-projects. No other vendors or product versions are listed.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk. EPSS data is unavailable, and the issue is not listed in the KEV catalog, suggesting it is not widely exploited in the wild yet. Remote exploitation is possible through crafted input to the Payment Handler endpoint. No formal patch has been released, making the vulnerability exploitable as long as the vulnerable code remains unpatched.

Generated by OpenCVE AI on March 31, 2026 at 19:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and install any available updates or patches for the Simple Gym Management System from code-projects.org.
  • Implement input validation or, preferably, parameterized queries for all payment-related parameters to eliminate injection opportunities.
  • Restrict unauthenticated users from accessing the Payment Handler endpoint and enforce proper authentication and authorization checks.
  • Enable logging of SQL errors and monitor traffic for anomalous query patterns that may indicate attempted exploitation.
  • Deploy a web application firewall or similar security controls to filter malicious input until a patch is applied.

Generated by OpenCVE AI on March 31, 2026 at 19:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Gym Management System
Vendors & Products Code-projects
Code-projects simple Gym Management System

Tue, 31 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple Gym Management System 1.0. This vulnerability affects unknown code of the component Payment Handler. The manipulation of the argument Payment_id/Amount/customer_id/payment_type/customer_name leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
Title code-projects Simple Gym Management System Payment sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Gym Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T13:57:53.811Z

Reserved: 2026-03-31T08:52:35.942Z

Link: CVE-2026-5206

cve-icon Vulnrichment

Updated: 2026-04-01T13:57:50.322Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T18:16:59.520

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-5206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:37:44Z

Weaknesses