Description
A security flaw has been discovered in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function of the file /crud.php. The manipulation of the argument user_Id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-09
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection remote
Action: Immediate Patch
AI Analysis

Impact

The flaw exists in the /crud.php file of code‑projects Simple IT Discussion Forum 1.0, where an unvalidated user_Id parameter enables attackers to insert arbitrary SQL commands. This classic SQL injection, captured by CWE‑74 and CWE‑89, allows unauthorized execution of SQL, potentially exposing, modifying, or deleting forum data. An exploit has been released publicly, confirming the vulnerability is known to adversaries.

Affected Systems

The only affected product is code‑projects Simple IT Discussion Forum version 1.0. Users running this version should verify whether an updated release that addresses the injection has been issued.

Risk and Exploitability

The base severity score of 6.9 indicates a moderate but significant risk. The existence of a public exploit and the possibility to attack remotely without special prerequisites suggest a high likelihood of exploitation. Although not yet listed in the CISA Known Exploited Vulnerabilities catalog, the remote nature and severity of this vulnerability make it a high priority for mitigation. Attackers can manipulate the user_Id parameter to execute arbitrary SQL, potentially compromising the confidentiality, integrity, and availability of the forum database.

Generated by OpenCVE AI on April 9, 2026 at 23:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s official patch or upgrade to a newer release that fixes the injection
  • If a patch is not available, replace the vulnerable code with a parameterized query or escape the user_Id input
  • As a temporary measure, block direct access to crud.php or restrict traffic to the user_Id parameter using web application firewall rules
  • Monitor database logs for suspicious activity and limit privileges of the database user used by the forum
  • Confirm that the site runs the latest stable code and apply any security updates as soon as they become available

Generated by OpenCVE AI on April 9, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple It Discussion Forum
Vendors & Products Code-projects
Code-projects simple It Discussion Forum

Thu, 09 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Simple IT Discussion Forum 1.0. The affected element is an unknown function of the file /crud.php. The manipulation of the argument user_Id results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Title code-projects Simple IT Discussion Forum crud.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple It Discussion Forum
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T14:09:30.327Z

Reserved: 2026-04-09T12:20:19.300Z

Link: CVE-2026-5985

cve-icon Vulnrichment

Updated: 2026-04-10T14:09:25.515Z

cve-icon NVD

Status : Deferred

Published: 2026-04-09T23:17:01.710

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5985

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:38Z

Weaknesses