Description
A vulnerability has been found in code-projects Online Application System for Admission 1.0. This issue affects some unknown processing of the file /enrollment/admsnform.php of the component Endpoint. Such manipulation leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the admsnform.php endpoint of the code‑projects Online Application System for Admission allows an attacker to inject arbitrary SQL statements. The injection occurs because user-supplied data is incorporated into queries without proper sanitization or parameterization. An attacker can thus read, modify or delete database records, potentially exposing sensitive applicant information and compromising the integrity and confidentiality of the admissions database.

Affected Systems

The vulnerability exists in code‑projects Online Application System for Admission version 1.0. No specific sub‑version details are provided, but the affected component is the "Enrollment" module accessed through /enrollment/admsnform.php. Users running this system should verify whether they are using the mentioned product and assess whether their deployment includes the vulnerable component.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity impact. While the EPSS score is not available, the vulnerability is publicly disclosed and can be exploited remotely over the network without local access. It is not listed in CISA's KEV catalog, but its presence in the public domain means attackers could craft tailored payloads. The lack of a mitigation published by the vendor increases the likelihood of exploitation if the issue remains unpatched.

Generated by OpenCVE AI on April 6, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or upgrade to a version that removes the SQL injection flaw.
  • If no patch is available, sanitize all input parameters and enforce whitelist validation before they reach the database layer.
  • Replace dynamic query construction with prepared statements or parameterized queries to eliminate injection vectors.
  • Restrict the database user privileges to the minimum required operations for the application.
  • Monitor web application logs for anomalous SQL activity and review database access patterns regularly.

Generated by OpenCVE AI on April 6, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Application System For Admission
Vendors & Products Code-projects
Code-projects online Application System For Admission

Mon, 06 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Online Application System for Admission 1.0. This issue affects some unknown processing of the file /enrollment/admsnform.php of the component Endpoint. Such manipulation leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Online Application System for Admission Endpoint admsnform.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Application System For Admission
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T03:07:10.501Z

Reserved: 2026-04-05T20:46:07.484Z

Link: CVE-2026-5649

cve-icon Vulnrichment

Updated: 2026-04-07T03:07:06.929Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T12:16:19.387

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:51Z

Weaknesses