Description
A vulnerability was detected in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file sendMessage.php. The manipulation of the argument type/length/business parameter validity results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-05-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

SendMessage.php in code‑projects Simple Chat System 1.0 handles user-supplied message parameters without proper validation, allowing attackers to inject arbitrary SQL. This flaw is identified by CWE‑74 and CWE‑89 and can lead to unauthorized reading or modification of chat logs and user data. The exploit is publicly available, and attackers can target the vulnerability remotely via standard web requests to the sendMessage endpoint. Based on the description, it is inferred that the vulnerable endpoint does not require authentication, enabling attackers to exploit it remotely via standard HTTP methods.

Affected Systems

The affected product is code‑projects Simple Chat System 1.0. The flaw resides in the sendMessage.php file that processes chat messaging. No patched version is currently listed by the CNA, so all installations of version 1.0 are potentially vulnerable. The product's CPE is cpe:2.3:a:code-projects:simple_chat_system:*:*:*:*:*:*:*.*

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity impact. Because EPSS is not reported and the vulnerability is not in CISA KEV, the widespread exploitation evidence is limited, though public proof‑of‑concept code exists. Attackers can achieve remote database compromise, compromising confidentiality and integrity of stored messages and user accounts. The risk is moderate but the flaw is certainly exploitable by anyone with network access.

Generated by OpenCVE AI on May 8, 2026 at 02:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Simple Chat System to any fixed release or apply the vendor‑provided patch addressing the SQL injection in sendMessage.php.
  • If an upgrade is not immediately possible, modify sendMessage.php to sanitize all user inputs, use parameterized queries (prepared statements), or an ORM to prevent concatenation of raw data into SQL commands.
  • Add authentication or restrict access to the sendMessage endpoint through firewall rules, proxies, or application‑level access control so that only legitimate users can reach it.

Generated by OpenCVE AI on May 8, 2026 at 02:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 01:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Simple Chat System 1.0. This vulnerability affects unknown code of the file sendMessage.php. The manipulation of the argument type/length/business parameter validity results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.
Title code-projects Simple Chat System sendMessage.php sql injection
First Time appeared Code-projects
Code-projects simple Chat System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_chat_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Chat System
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Chat System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-08T01:30:10.489Z

Reserved: 2026-05-07T17:09:04.622Z

Link: CVE-2026-8125

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T02:16:08.200

Modified: 2026-05-08T02:16:08.200

Link: CVE-2026-8125

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T03:00:09Z

Weaknesses