Description
A vulnerability was found in code-projects Online Lot Reservation System up to 1.0. This affects the function readfile of the file /download.php. The manipulation of the argument File results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Published: 2026-04-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote arbitrary file read via path traversal
Action: Apply Patch
AI Analysis

Impact

The located vulnerability in the download.php file of the code-projects Online Lot Reservation System permits an attacker to supply a specially crafted File parameter that exploits a path traversal flaw. This flaw allows the reader to access files outside the intended download directory, and it could potentially expose sensitive system files and credentials, which is an inferred consequence rather than explicitly documented. The weakness is identified as CWE‑22 and results in the disclosure of arbitrary files rather than code execution or denial of service.

Affected Systems

The flaw affects the code-projects Online Lot Reservation System, specifically versions up to and including 1.0. Users deploying these versions are at risk if the download.php endpoint is exposed to untrusted input.

Risk and Exploitability

With a CVSS score of 6.9, the vulnerability is classified as moderate severity. While EPSS data is not available, the issue has a publicly released exploit, indicating that the likelihood of an attack is non‑negligible. The exploit is remote and does not require privileged user access, making the risk higher for exposed installations. The vulnerability is not listed in CISA’s KEV catalog, but the existence of a public exploit suggests that attackers could target vulnerable systems before a vendor patch is applied.

Generated by OpenCVE AI on April 28, 2026 at 13:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Online Lot Reservation System to a patched version that addresses the readfile path traversal issue.
  • Implement strict input validation on the File parameter, ensuring it only accepts filenames within a whitelisted directory and blocks any directory traversal characters.
  • Configure the server environment to restrict PHP’s file access, such as using open_basedir or similar mechanisms to prevent files outside the designated directory from being read.

Generated by OpenCVE AI on April 28, 2026 at 13:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects online Lot Reservation System
Vendors & Products Code-projects
Code-projects online Lot Reservation System

Mon, 27 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Online Lot Reservation System up to 1.0. This affects the function readfile of the file /download.php. The manipulation of the argument File results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used.
Title code-projects Online Lot Reservation System download.php readfile path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Online Lot Reservation System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T16:30:16.995Z

Reserved: 2026-04-26T19:20:56.284Z

Link: CVE-2026-7132

cve-icon Vulnrichment

Updated: 2026-04-27T16:30:04.354Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T15:16:21.603

Modified: 2026-04-27T18:36:19.637

Link: CVE-2026-7132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T13:15:31Z

Weaknesses