Description
A security flaw has been discovered in code-projects Simple Content Management System 1.0. Affected by this issue is some unknown functionality of the file /web/index.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-13
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection via web parameter
Action: Immediate Patch
AI Analysis

Impact

The Simple Content Management System 1.0 contains a flaw in the index.php script that allows an attacker to supply a crafted value for the ID parameter. Because the value is incorporated directly into a SQL statement without sanitization, an attacker can inject arbitrary SQL. This can lead to data disclosure, alteration, or even undermine database integrity, and may serve as a foothold for further compromise. The weakness corresponds to SQL injection (CWE-74).

Affected Systems

The affected software is code-projects Simple Content Management System version 1.0. No other affected versions are disclosed, so systems running that exact version are at risk.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate severity, but the fact that remote exploitation is possible and the exploit has been publicly released raises the overall risk. Because the EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, the exact likelihood of exploitation cannot be quantified, yet the remote nature and moderate CVSS value suggest that administrators should treat this as a high-priority issue. Attackers could potentially gain unauthorized database access by sending malicious requests to the web application from the Internet.

Generated by OpenCVE AI on April 13, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for an official patch or newer release from the vendor and apply it immediately.
  • If no patch exists, restrict external access to the impacted URL or disable the index.php functionality until remediation.
  • Implement a web application firewall or rate-limit the ID parameter to block suspicious payloads.
  • Monitor web server logs for unexpected SQL queries or repeated failed attempts.
  • Employ input validation or use prepared statements if you maintain custom code.

Generated by OpenCVE AI on April 13, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Content Management System
Vendors & Products Code-projects
Code-projects simple Content Management System

Mon, 13 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Simple Content Management System 1.0. Affected by this issue is some unknown functionality of the file /web/index.php. Performing a manipulation of the argument ID results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.
Title code-projects Simple Content Management System index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Content Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T18:51:55.122Z

Reserved: 2026-04-13T08:24:40.861Z

Link: CVE-2026-6183

cve-icon Vulnrichment

Updated: 2026-04-13T18:51:48.319Z

cve-icon NVD

Status : Deferred

Published: 2026-04-13T15:17:49.697

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6183

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:34:16Z

Weaknesses