Description
A vulnerability was identified in code-projects Simple Content Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /web/admin/login.php. Such manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
Published: 2026-04-13
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection
Action: Apply Patch
AI Analysis

Impact

An injection flaw exists in the User parameter of the /web/admin/login.php script of code‑projects Simple Content Management System 1.0. By manipulating that argument, an attacker can inject arbitrary SQL code, allowing unauthorized read or write access to the underlying database. The vulnerability can lead to data theft, modification, or deletion, and if an attacker gains sufficient privileges, it may provide a foothold to further compromise the system.

Affected Systems

The vulnerability affects the code‑projects Simple Content Management System version 1.0. No other versions or related products are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the exploit can be launched remotely. Publicly available exploit code has been reported, implying that attackers could freely target systems with this flaw. Although the EPSS score is not available and the issue is not listed in KEV, the combination of a remote attack surface and publicly disclosed exploitation code raises the risk of real-world impact for unpatched installations.

Generated by OpenCVE AI on April 13, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest patched release of the Simple Content Management System if available
  • Obtain and apply any security hotfixes or patches released by the vendor
  • Replace or modify the login.php script to validate and sanitize all User inputs before using them in SQL statements
  • Implement parameterized queries or stored procedures to interact with the database
  • Enable logging of failed login attempts and monitor for suspicious activity

Generated by OpenCVE AI on April 13, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Content Management System
Vendors & Products Code-projects
Code-projects simple Content Management System

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Simple Content Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /web/admin/login.php. Such manipulation of the argument User leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
Title code-projects Simple Content Management System login.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-14T16:29:36.999Z

Reserved: 2026-04-13T08:24:37.119Z

Link: CVE-2026-6182

cve-icon Vulnrichment

Updated: 2026-04-14T15:22:55.597Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T15:17:49.487

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6182

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:34:18Z

Weaknesses