Description
A security vulnerability has been detected in code-projects Simple IT Discussion Forum 1.0. This vulnerability affects unknown code of the file /topic-details.php. The manipulation of the argument post_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Database Compromise via Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The flaw is a remote SQL injection vulnerability located in the topic-details.php file of the Simple IT Discussion Forum 1.0. The attacker can manipulate the post_id argument to inject SQL statements, falling under CWE‑74 (Insecure URL Manipulation) and CWE‑89 (SQL Injection). This allows unauthorized read, update, or delete of forum data, compromising confidentiality, integrity, and potentially availability of the application.

Affected Systems

Vulnerable systems include installations of code‑projects Simple IT Discussion Forum version 1.0. The issue resides in the topic‑details page that processes the post_id parameter. No other product versions were explicitly identified in the advisory.

Risk and Exploitability

With a CVSS base score of 6.9 the vulnerability is considered high severity, and its public disclosure means attackers can craft HTTP requests to trigger the flaw from anywhere. The EPSS score is not available and the issue is not listed in the KEV catalog, but the lack of an available fix and the remote nature of the attack suggest a notable risk of exploitation. Exploitation requires only sending a crafted post_id value in a request to the forum, after which the attacker can execute arbitrary SQL against the backend database.

Generated by OpenCVE AI on April 9, 2026 at 17:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for a vendor patch or newer release and apply it immediately.
  • If a patch is not available, restrict direct web access to trusted IP addresses or use a VPN.
  • Enforce input validation so the post_id parameter accepts only numeric values.
  • Update the forum code to use prepared statements or parameterized queries to eliminate SQL injection.
  • Deploy a web application firewall to detect and block SQL injection patterns.
  • Monitor database logs for suspicious activity and audit for unauthorized changes.
  • Consult the linked community resources for further fixes or workarounds.

Generated by OpenCVE AI on April 9, 2026 at 17:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple It Discussion Forum
Vendors & Products Code-projects
Code-projects simple It Discussion Forum

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple IT Discussion Forum 1.0. This vulnerability affects unknown code of the file /topic-details.php. The manipulation of the argument post_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Simple IT Discussion Forum topic-details.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple It Discussion Forum
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-09T19:37:15.178Z

Reserved: 2026-04-09T10:00:52.674Z

Link: CVE-2026-5961

cve-icon Vulnrichment

Updated: 2026-04-09T17:47:11.633Z

cve-icon NVD

Status : Deferred

Published: 2026-04-09T17:16:33.957

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:32:12Z

Weaknesses