Description
A vulnerability was identified in projectworlds Car Rental Project 1.0. Affected by this vulnerability is an unknown functionality of the file /book_car.php of the component Parameter Handler. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the book_car.php script of the projectworlds Car Rental Project allows an attacker to manipulate the fname parameter without proper sanitization, resulting in a classic SQL injection vulnerability. Through this vulnerability an adversary can execute arbitrary SQL commands against the underlying database, potentially reading, modifying, or deleting sensitive rental data. This threat undermines the confidentiality, integrity, and could compromise availability if excessive or disruptive queries are performed.

Affected Systems

The vulnerability affects version 1.0 of the projectworlds Car Rental Project, specifically the Parameter Handler component within the book_car.php page. No other versions or vendors are reported to be impacted by this particular flaw.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high risk level. EPSS data is not supplied, and the issue is not listed in the CISA KEV catalog. The vendor description confirms that the attack can be initiated remotely and that a public exploit exists, suggesting that attackers can deliver malicious payloads via standard HTTP requests to the vulnerable page.

Generated by OpenCVE AI on April 6, 2026 at 11:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor–supplied patch or update to a version where the Parameter Handler in book_car.php is secured.
  • If a patch is unavailable, modify the application to validate and sanitize the fname input on the server side, for example by using prepared statements or proper escaping.
  • Restrict direct access to book_car.php to authenticated users only and/or block the endpoint through firewall rules to limit exposure.
  • Monitor web server and database logs for abnormal query patterns or suspicious activity to detect potential exploitation attempts.

Generated by OpenCVE AI on April 6, 2026 at 11:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in projectworlds Car Rental Project 1.0. Affected by this vulnerability is an unknown functionality of the file /book_car.php of the component Parameter Handler. The manipulation of the argument fname leads to sql injection. The attack can be initiated remotely. The exploit is publicly available and might be used.
Title projectworlds Car Rental Project Parameter book_car.php sql injection
First Time appeared Projectworlds
Projectworlds car Rental Project
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:projectworlds:car_rental_project:*:*:*:*:*:*:*:*
Vendors & Products Projectworlds
Projectworlds car Rental Project
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Car Rental Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T03:03:43.416Z

Reserved: 2026-04-05T19:15:39.694Z

Link: CVE-2026-5634

cve-icon Vulnrichment

Updated: 2026-04-07T03:03:38.996Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T08:16:39.700

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:47:15Z

Weaknesses