Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0546: SQL Injection in code-projects Content Management System

0
Medium
VulnerabilityCVE-2026-0546cvecve-2026-0546
Published: Fri Jan 02 2026 (01/02/2026, 09:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Content Management System

Description

A vulnerability was determined in code-projects Content Management System 1.0. This impacts an unknown function of the file search.php. This manipulation of the argument Value causes sql injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized.

AI-Powered Analysis

AILast updated: 01/02/2026, 09:28:48 UTC

Technical Analysis

CVE-2026-0546 identifies a SQL injection vulnerability in version 1.0 of the code-projects Content Management System, specifically within an unspecified function in the search.php file. The vulnerability arises from improper sanitization of the 'Value' argument, which an attacker can manipulate to inject arbitrary SQL code. This injection flaw allows remote attackers to execute unauthorized SQL queries against the backend database without requiring authentication or user interaction. The vulnerability is exploitable over the network, making it accessible to attackers without prior access. The publicly disclosed exploit details increase the likelihood of exploitation, although no active exploits have been reported in the wild yet. The impact of successful exploitation includes unauthorized disclosure of sensitive data, data tampering, or even deletion, potentially compromising the confidentiality, integrity, and availability of the CMS and its hosted data. The CVSS v4.0 score of 6.9 reflects a medium severity, considering the ease of exploitation (low attack complexity, no privileges or user interaction required) but limited scope and impact (low confidentiality, integrity, and availability impact). The vulnerability does not affect the system component's security controls beyond the database query layer and does not involve privilege escalation or lateral movement. The lack of official patches or vendor advisories necessitates immediate mitigation efforts by administrators.

Potential Impact

For European organizations using the code-projects CMS version 1.0, this vulnerability poses a significant risk of unauthorized data access and manipulation. Exploitation could lead to exposure of sensitive business or personal data, violating GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Integrity of website content and backend data could be compromised, undermining trust and operational continuity. Availability may also be affected if attackers execute destructive SQL commands. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on this CMS are particularly vulnerable. The remote and unauthenticated nature of the exploit increases the attack surface, especially for publicly accessible web servers. Given the public disclosure of exploit details, the risk of automated scanning and exploitation attempts is elevated, necessitating prompt action to prevent breaches and data loss.

Mitigation Recommendations

1. Immediate mitigation should focus on applying input validation and sanitization to the 'Value' parameter in search.php, ensuring that only expected data types and formats are accepted. 2. Implement parameterized queries or prepared statements to prevent SQL injection attacks at the code level. 3. If patching is not yet available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the vulnerable parameter. 4. Restrict public access to the CMS search functionality where feasible, using network segmentation or access control lists to limit exposure. 5. Conduct thorough code reviews and security testing of the CMS to identify and remediate similar injection points. 6. Monitor logs for suspicious database queries or unusual application behavior indicative of exploitation attempts. 7. Educate development and operations teams about secure coding practices and the importance of timely patch management. 8. Plan for upgrading to a patched or newer version of the CMS once available from the vendor.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-01T10:45:42.664Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69578c4bdb813ff03edaa617

Added to database: 1/2/2026, 9:13:47 AM

Last enriched: 1/2/2026, 9:28:48 AM

Last updated: 1/9/2026, 4:06:09 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats