Description
A vulnerability was detected in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknown function of the file /delete-category.php. Performing a manipulation of the argument cat_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Published: 2026-04-10
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the /delete-category.php file of code-projects Simple IT Discussion Forum 1.0 allows a malicious attacker to supply a manipulated cat_id parameter. The application fails to validate or escape this input before inserting it into a SQL query, resulting in a classic SQL injection vulnerability. The flaw can be triggered remotely over HTTP, and the exploit is publicly available.

Affected Systems

The affected product is code-projects Simple IT Discussion Forum version 1.0. No other product versions are listed as affected. The vulnerability resides in an unnamed function within the delete-category.php module.

Risk and Exploitability

The reported CVSS score of 6.9 indicates moderate‐to‐high severity. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted HTTP requests containing malicious cat_id values to the delete-category.php endpoint without the need for authentication. Once exploited, an adversary could read or modify database records, potentially compromising confidential forum data or disrupting service. Given that the vulnerability is publicly disclosed and exploitable over the network, the likelihood of real‐world exploitation is considered significant.

Generated by OpenCVE AI on April 10, 2026 at 03:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the vendor‑supplied security patch for Simple IT Discussion Forum 1.0 as soon as it is released.
  • If a patch is not yet available, block external access to the /delete-category.php endpoint using a firewall or .htaccess rule.
  • Implement server‑side validation that limits cat_id to numeric values or rewrite the query using prepared statements to prevent SQL injection.
  • Deploy a web application firewall rule that detects and blocks SQL injection payloads aimed at the cat_id field.
  • Monitor web‑server logs for suspicious requests to delete-category.php and investigate any anomalies promptly.

Generated by OpenCVE AI on April 10, 2026 at 03:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple It Discussion Forum
Vendors & Products Code-projects
Code-projects simple It Discussion Forum

Fri, 10 Apr 2026 02:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Simple IT Discussion Forum 1.0. Impacted is an unknown function of the file /delete-category.php. Performing a manipulation of the argument cat_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
Title code-projects Simple IT Discussion Forum delete-category.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple It Discussion Forum
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-10T13:44:55.927Z

Reserved: 2026-04-09T13:23:49.696Z

Link: CVE-2026-6004

cve-icon Vulnrichment

Updated: 2026-04-10T13:44:50.286Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T03:16:04.700

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6004

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:27:01Z

Weaknesses