Description
A vulnerability was determined in projectworlds Car Rental Project 1.0. The affected element is an unknown function of the file /login.php of the component Parameter Handler. This manipulation of the argument uname causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

The vulnerability is in the login.php file of the projectworlds Car Rental Project. An unspecified function in the Parameter Handler processes the uname parameter without proper sanitization, allowing an attacker to inject arbitrary SQL statements. This results in a classic SQL injection flaw (CWE‑89) combined with improper input validation (CWE‑74). If exploited, the attacker could read, modify, or delete data in the underlying database, thereby compromising confidentiality, integrity, and potentially availability of the application data.

Affected Systems

This flaw affects projectworlds’ Car Rental Project version 1.0. Users running this version should verify whether the login.php component has been patched or replaced by a newer build, as the affected element is tied to the Parameter Handler module.

Risk and Exploitability

The CVSS score of 6.9 places this vulnerability in the Medium severity range. EPSS data is not available, and the flaw is not listed in the CISA KEV catalog. The description indicates that remote exploitation via the web interface is possible, so attackers can likely trigger it by sending crafted HTTP requests containing malicious uname values to the login page. Given the public disclosure and lack of an official patch, the risk of active exploitation remains significant. Its Medium severity, combined with the remote nature of the attack, suggests that attackers could target exposed instances of this application.

Generated by OpenCVE AI on April 2, 2026 at 23:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s repository or website for a patched version of the Car Rental Project; update to a newer release if available.
  • If no official patch exists, modify the login.php source to whiten the uname parameter, ensuring it is properly escaped or bound in a parameterized SQL query.
  • Deploy a Web Application Firewall rule that blocks obvious SQL injection patterns targeting the uname field.
  • Restrict exposure of the login interface to trusted networks or apply IP filtering and rate limiting to reduce brute‑force or injection attempts.

Generated by OpenCVE AI on April 2, 2026 at 23:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in projectworlds Car Rental Project 1.0. The affected element is an unknown function of the file /login.php of the component Parameter Handler. This manipulation of the argument uname causes sql injection. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.
Title projectworlds Car Rental Project Parameter login.php sql injection
First Time appeared Projectworlds
Projectworlds car Rental Project
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:projectworlds:car_rental_project:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds car Rental Project
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Projectworlds Car Rental Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T17:44:32.432Z

Reserved: 2026-04-01T18:43:27.709Z

Link: CVE-2026-5368

cve-icon Vulnrichment

Updated: 2026-04-02T17:44:29.013Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T18:16:35.110

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-5368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:18:08Z

Weaknesses