Impact
The vulnerability resides in the admin/checklogin.php of Feedback System 1.0. An attacker can manipulate the email argument, causing an SQL query to be executed with injected payload, allowing unauthorized read or modification of database contents. This flaw is a classic SQL injection, mapped to CWE-74 and CWE-89.
Affected Systems
The affected product is code‑projects Feedback System version 1.0. Earlier or later releases are not known to be impacted. The flaw exists in the administration module of that specific release.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. EPSS is not available, so the exploitation frequency is unclear. The vulnerability is not listed in CISA KEV. The attack can be launched remotely by sending a malicious email parameter to checklogin.php, meaning no prior authentication is required. Successful exploitation may lead to data exposure, alteration, or deletion, and potentially elevate privileges if administrative functions are compromised.
OpenCVE Enrichment