Description
A security vulnerability has been detected in code-projects Online FIR System 1.0. Affected by this vulnerability is an unknown functionality of the file /Login/checklogin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

The flaw is an unsanitized SQL query built from the email and password fields in the CheckLogin PHP script. The attacker can supply crafted input, causing the database to execute arbitrary SQL statements. This can expose or alter sensitive user data and potentially give the attacker non‑privileged access to the application’s back‑end. The vulnerability is a classic SQL injection, captured by the CWEs 74 and 89.

Affected Systems

The affected product is code-projects Online FIR System version 1.0. No other products or versions were specifically mentioned. Users running this version should verify whether the CheckLogin module is in use, as the vulnerability exists in that component.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity. No EPSS score is available and the issue is not listed in CISA’s KEV catalog. The exploit is available publicly and can be performed remotely via HTTP requests to the CheckLogin endpoint. An attacker does not need privileged credentials to trigger the injection, so the risk to confidentiality and integrity is significant if the database contains sensitive information.

Generated by OpenCVE AI on April 6, 2026 at 17:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch or upgrade to a version that addresses the SQL injection in the login module.
  • If no patch is available, isolate or remove the vulnerable CheckLogin endpoint from the public web root.
  • Restrict access to the login endpoint to trusted IP ranges or use a Web Application Firewall to filter malicious queries.
  • Implement server‑side input validation and prepared statements to eliminate the injection vector in the code.
  • Monitor authentication logs for repeated failed or malformed login attempts and investigate suspicious activity.

Generated by OpenCVE AI on April 6, 2026 at 17:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Fir System
Vendors & Products Code-projects
Code-projects online Fir System

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Online FIR System 1.0. Affected by this vulnerability is an unknown functionality of the file /Login/checklogin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Online FIR System Login checklogin.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Fir System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:34:25.071Z

Reserved: 2026-04-06T08:09:01.539Z

Link: CVE-2026-5665

cve-icon Vulnrichment

Updated: 2026-04-06T15:34:19.415Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T16:16:41.773

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:24Z

Weaknesses