Description
A weakness has been identified in projectworlds Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /pay.php of the component Parameter Handler. Executing a manipulation of the argument mpesa can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch Now
AI Analysis

Impact

A weakness in the /pay.php file of projectworlds Car Rental System 1.0 allows an attacker to manipulate the mpesa parameter, enabling arbitrary SQL injection. Because the vulnerable code executes the parameter directly in a database query, an attacker can read, alter, or delete records in the application’s database. This breach compromises data confidentiality and integrity and can affect all customer and transaction information processed by the system.

Affected Systems

The affected system is the projectworlds Car Rental System, version 1.0, specifically the Parameter Handler component of the /pay.php script. No other products or versions are indicated as impacted, so the risk is confined to installations of this version.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. EPSS data is not available and the issue is not listed in the CISA KEV catalog. However, the vulnerability is exploitable via a remote HTTP request and an exploit code is publicly available, raising the practical risk considerably. An attacker could achieve full database compromise by crafting a malicious mpesa value and sending it to the pay.php endpoint from an external source.

Generated by OpenCVE AI on April 6, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any available vendor patch or update to a fixed version of projectworlds Car Rental System that removes the SQL injection in /pay.php.
  • If a patch is not yet released, replace the vulnerable code with input validation and parameterized queries that properly escape or bind the mpesa parameter.
  • Disable or restrict the /pay.php endpoint for environments where online payments are not required, using access controls or firewall rules.
  • Monitor database activity and application logs for suspicious queries or repeated attempts to manipulate the mpesa parameter.

Generated by OpenCVE AI on April 6, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Projectworlds
Projectworlds car Rental System
Vendors & Products Projectworlds
Projectworlds car Rental System

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in projectworlds Car Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file /pay.php of the component Parameter Handler. Executing a manipulation of the argument mpesa can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title projectworlds Car Rental System Parameter pay.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Projectworlds Car Rental System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:53:05.011Z

Reserved: 2026-04-05T20:39:45.716Z

Link: CVE-2026-5645

cve-icon Vulnrichment

Updated: 2026-04-06T14:52:59.874Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T11:17:03.177

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:56Z

Weaknesses