Description
A vulnerability was found in code-projects Gym Management System In PHP and Windows NT 1.0. This vulnerability affects unknown code of the file /index.php. Performing a manipulation of the argument day results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the code-projects Gym Management System In PHP allows a SQL injection attack through manipulation of the "day" parameter in /index.php. This weakness, identified as CWE-89, enables an attacker to inject arbitrary SQL, potentially reading, modifying, or deleting database contents. The vulnerability can affect confidentiality, integrity, and availability of the system’s data, and it can be exploited remotely by submitting a crafted HTTP request to the vulnerable endpoint.

Affected Systems

Affected assets include the code-projects Gym Management System In PHP and the associated Windows NT platform; the exact version of the application is unknown. The flaw resides in unknown code within the index.php file of the application, specifically the handling of the "day" argument.

Risk and Exploitability

The CVSS score of 5.3 denotes moderate severity. Exploitation is remote and the vulnerability has already been publicized. EPSS data is unavailable and the flaw is not listed in CISA’s KEV catalog. The likely attack vector is a crafted HTTP request that alters the "day" argument sent to index.php, enabling injection of malicious SQL statements.

Generated by OpenCVE AI on May 4, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑released patch or upgrade to a newer version of the Gym Management System that addresses the SQL injection flaw.
  • Rewrite the affected code to use parameterized queries or input sanitization, ensuring that the "day" argument is validated and escaped before inclusion in SQL statements.
  • Configure database user accounts with the minimal privileges required by the application, limiting the impact of any successful injection.

Generated by OpenCVE AI on May 4, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Gym Management System In PHP and Windows NT 1.0. This vulnerability affects unknown code of the file /index.php. Performing a manipulation of the argument day results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Title code-projects Gym Management System In PHP/Windows NT index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T00:45:13.763Z

Reserved: 2026-05-03T08:03:44.106Z

Link: CVE-2026-7716

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-04T01:16:05.207

Modified: 2026-05-04T01:16:05.207

Link: CVE-2026-7716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T03:00:11Z

Weaknesses