Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0565: SQL Injection in code-projects Content Management System

0
Medium
VulnerabilityCVE-2026-0565cvecve-2026-0565
Published: Fri Jan 02 2026 (01/02/2026, 14:02:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Content Management System

Description

A weakness has been identified in code-projects Content Management System 1.0. This issue affects some unknown processing of the file /admin/delete.php. Executing manipulation of the argument del can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

AILast updated: 01/09/2026, 14:56:37 UTC

Technical Analysis

CVE-2026-0565 identifies a SQL Injection vulnerability in the code-projects Content Management System (CMS) version 1.0. The vulnerability resides in the /admin/delete.php script, where the 'del' parameter is improperly sanitized or validated, allowing an attacker to inject malicious SQL code. This injection flaw can be exploited remotely without requiring authentication or user interaction, enabling attackers to manipulate backend database queries. Potential impacts include unauthorized data retrieval, modification, or deletion, compromising confidentiality, integrity, and availability of the CMS data. The vulnerability has been assigned a CVSS 4.0 score of 6.9, reflecting medium severity with network attack vector, low complexity, and no privileges or user interaction needed. Although no known active exploitation in the wild has been reported, public exploit code availability increases the risk of attacks. The CMS is likely used by small to medium organizations for website content management, and exploitation could lead to data breaches or defacement. The lack of available patches or vendor advisories necessitates immediate mitigation efforts by users. This vulnerability highlights the critical need for secure input validation and parameter handling in web applications, especially in administrative interfaces.

Potential Impact

For European organizations using code-projects CMS version 1.0, this vulnerability poses a significant risk of unauthorized database access and manipulation. Exploitation could lead to leakage of sensitive information, unauthorized data modification, or deletion, impacting business operations and regulatory compliance, particularly under GDPR. The ability to execute attacks remotely without authentication increases exposure, especially for publicly accessible administrative endpoints. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, face heightened risks of reputational damage and legal consequences. Additionally, attackers could leverage this vulnerability to pivot within networks or deploy further malware. The medium severity rating suggests a moderate but tangible threat that requires prompt attention to prevent escalation. The absence of known active exploitation provides a window for mitigation but also means attackers may be preparing or conducting targeted reconnaissance. Overall, the impact on confidentiality, integrity, and availability is substantial enough to warrant immediate remediation in affected environments.

Mitigation Recommendations

1. Immediately audit all instances of code-projects CMS version 1.0 to identify affected systems, focusing on those exposing the /admin/delete.php endpoint. 2. Implement strict input validation and parameter sanitization on the 'del' parameter to prevent SQL injection, using prepared statements or parameterized queries. 3. If vendor patches or updates become available, apply them promptly. 4. Restrict access to administrative interfaces via network controls such as IP whitelisting, VPNs, or web application firewalls (WAFs) to reduce exposure. 5. Monitor web server and database logs for suspicious queries or anomalous activity related to the 'del' parameter. 6. Conduct penetration testing and code reviews to identify and remediate similar injection flaws elsewhere in the CMS. 7. Educate development and IT teams on secure coding practices and the importance of input validation. 8. Consider migrating to a more secure or actively maintained CMS platform if patches are unavailable. 9. Deploy runtime application self-protection (RASP) or intrusion detection systems to detect and block exploitation attempts in real time. 10. Maintain regular backups of CMS data to enable recovery in case of data corruption or deletion.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-02T07:52:02.128Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6957d298db813ff03eed8b2b

Added to database: 1/2/2026, 2:13:44 PM

Last enriched: 1/9/2026, 2:56:37 PM

Last updated: 2/8/2026, 2:17:42 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats