Description
A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. Affected by this issue is some unknown functionality of the file /edit-category.php of the component Parameter Handler. The manipulation of the argument cat_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection enabling unauthorized database access or manipulation
Action: Immediate Patch
AI Analysis

Impact

A parameter-based SQL injection exists in the edit-category.php component of Code‑Projects Simple IT Discussion Forum 1.0. By manipulating the cat_id argument, an attacker can inject arbitrary SQL that may read, modify, or delete underlying data. The flaw allows remote exploitation through a web request without needing prior authentication, potentially exposing sensitive information and compromising the integrity of the forum database.

Affected Systems

The vulnerability affects the Code‑Projects Simple IT Discussion Forum version 1.0. No other product versions are mentioned in the vulnerability report.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity, and the lack of EPSS data suggests limited publicly known exploitation metrics. The flaw is not listed in the CISA KEV catalog, but the nature of the SQL injection and the remote attack vector mean a successful exploit could lead to data exfiltration or unauthorized database modification. The attack requires web access to the vulnerable page and does not mention authentication bypass, yet the unsanitized parameter makes exploitation straightforward for a determined attacker.

Generated by OpenCVE AI on April 6, 2026 at 21:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s official security update for the Simple IT Discussion Forum 1.0 when it becomes available.
  • If no patch is published, sanitize and validate the cat_id input on the server side, preferably using prepared statements or parameterized queries.
  • Restrict external access to the /edit-category.php page via firewall or application‑layer controls to limit exposure to trusted administrators.
  • Monitor web server and database logs for anomalous SQL activity that may indicate exploitation attempts.

Generated by OpenCVE AI on April 6, 2026 at 21:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple It Discussion Forum
Vendors & Products Code-projects
Code-projects simple It Discussion Forum

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Simple IT Discussion Forum 1.0. Affected by this issue is some unknown functionality of the file /edit-category.php of the component Parameter Handler. The manipulation of the argument cat_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Simple IT Discussion Forum Parameter edit-category.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple It Discussion Forum
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T15:59:27.677Z

Reserved: 2026-04-06T08:22:26.668Z

Link: CVE-2026-5672

cve-icon Vulnrichment

Updated: 2026-04-07T15:18:25.943Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T18:16:46.127

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5672

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:58Z

Weaknesses