Description
A vulnerability was found in code-projects Gym Management System In PHP and Windows NT 1.0. This vulnerability affects unknown code of the file /index.php. Performing a manipulation of the argument day results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the code-projects Gym Management System In PHP allows a SQL injection attack through manipulation of the "day" parameter in /index.php. This weakness, identified as CWE-89, enables an attacker to inject arbitrary SQL, potentially reading, modifying, or deleting database contents. The vulnerability can affect confidentiality, integrity, and availability of the system’s data, and it can be exploited remotely by submitting a crafted HTTP request to the vulnerable endpoint.

Affected Systems

Affected assets include the code-projects Gym Management System In PHP and the associated Windows NT platform; the exact version of the application is unknown. The flaw resides in unknown code within the index.php file of the application, specifically the handling of the "day" argument.

Risk and Exploitability

The CVSS score of 5.3 denotes moderate severity. Exploitation is remote and the vulnerability has already been publicized. EPSS data is unavailable and the flaw is not listed in CISA’s KEV catalog. The likely attack vector is a crafted HTTP request that alters the "day" argument sent to index.php, enabling injection of malicious SQL statements.

Generated by OpenCVE AI on May 4, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑released patch or upgrade to a newer version of the Gym Management System that addresses the SQL injection flaw.
  • Rewrite the affected code to use parameterized queries or input sanitization, ensuring that the "day" argument is validated and escaped before inclusion in SQL statements.
  • Configure database user accounts with the minimal privileges required by the application, limiting the impact of any successful injection.

Generated by OpenCVE AI on May 4, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects gym Management System
Code-projects windows Nt
Vendors & Products Code-projects
Code-projects gym Management System
Code-projects windows Nt

Mon, 04 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 01:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Gym Management System In PHP and Windows NT 1.0. This vulnerability affects unknown code of the file /index.php. Performing a manipulation of the argument day results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Title code-projects Gym Management System In PHP/Windows NT index.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Gym Management System Windows Nt
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T13:01:17.516Z

Reserved: 2026-05-03T08:03:44.106Z

Link: CVE-2026-7716

cve-icon Vulnrichment

Updated: 2026-05-04T13:01:12.990Z

cve-icon NVD

Status : Deferred

Published: 2026-05-04T01:16:05.207

Modified: 2026-05-04T15:18:40.077

Link: CVE-2026-7716

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:18Z

Weaknesses