CVE-2026-0567: SQL Injection in code-projects Content Management System
A vulnerability was detected in code-projects Content Management System 1.0. The affected element is an unknown function of the file /pages.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
AI Analysis
Technical Summary
CVE-2026-0567 identifies a SQL Injection vulnerability in the code-projects Content Management System version 1.0, specifically within an unknown function in the /pages.php file. The vulnerability arises from improper sanitization of the 'ID' parameter, which can be manipulated remotely by an unauthenticated attacker to inject malicious SQL commands. This injection can lead to unauthorized database queries, potentially exposing sensitive data, altering or deleting records, or even enabling further compromise of the underlying system. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and partial impacts on confidentiality, integrity, and availability. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported to date. The lack of patches or vendor-provided fixes necessitates immediate attention from administrators. The vulnerability affects only version 1.0 of the CMS, which may limit the scope but still poses a significant risk to organizations relying on this software for content management. The attack surface includes any web-facing instance of the CMS where the vulnerable parameter is accessible.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to sensitive data stored within the CMS database, including potentially personal data protected under GDPR. Data integrity may be compromised through unauthorized modification or deletion of content, which can disrupt business operations and damage reputation. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. Organizations in sectors such as government, healthcare, education, and media that rely on this CMS for public-facing websites or internal portals are particularly at risk. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less maintained or legacy systems. Non-compliance with data protection regulations due to data breaches stemming from this vulnerability could result in significant legal and financial penalties within Europe.
Mitigation Recommendations
Immediate mitigation should focus on code-level remediation by sanitizing and validating the 'ID' parameter in /pages.php to prevent SQL injection, ideally by implementing parameterized queries or prepared statements. If source code modification is not feasible, deploying a Web Application Firewall (WAF) with rules to detect and block SQL injection attempts targeting the vulnerable parameter can provide interim protection. Conduct a thorough audit of all CMS instances to identify affected versions and isolate or restrict access to vulnerable endpoints. Regularly monitor logs for suspicious activity indicative of SQL injection attempts. Organizations should also consider upgrading to a patched or newer version of the CMS once available. Additionally, implement strict access controls and network segmentation to limit exposure of the CMS to only necessary users and systems. Backup critical data regularly to enable recovery in case of data corruption or loss.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2026-0567: SQL Injection in code-projects Content Management System
Description
A vulnerability was detected in code-projects Content Management System 1.0. The affected element is an unknown function of the file /pages.php. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-0567 identifies a SQL Injection vulnerability in the code-projects Content Management System version 1.0, specifically within an unknown function in the /pages.php file. The vulnerability arises from improper sanitization of the 'ID' parameter, which can be manipulated remotely by an unauthenticated attacker to inject malicious SQL commands. This injection can lead to unauthorized database queries, potentially exposing sensitive data, altering or deleting records, or even enabling further compromise of the underlying system. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with attack vector being network-based, no privileges or user interaction required, and partial impacts on confidentiality, integrity, and availability. The exploit code is publicly available, increasing the risk of exploitation, although no active exploitation in the wild has been reported to date. The lack of patches or vendor-provided fixes necessitates immediate attention from administrators. The vulnerability affects only version 1.0 of the CMS, which may limit the scope but still poses a significant risk to organizations relying on this software for content management. The attack surface includes any web-facing instance of the CMS where the vulnerable parameter is accessible.
Potential Impact
For European organizations, this vulnerability can lead to unauthorized access to sensitive data stored within the CMS database, including potentially personal data protected under GDPR. Data integrity may be compromised through unauthorized modification or deletion of content, which can disrupt business operations and damage reputation. Availability may also be affected if attackers execute destructive SQL commands or cause database corruption. Organizations in sectors such as government, healthcare, education, and media that rely on this CMS for public-facing websites or internal portals are particularly at risk. The public availability of exploit code increases the likelihood of opportunistic attacks, especially against less maintained or legacy systems. Non-compliance with data protection regulations due to data breaches stemming from this vulnerability could result in significant legal and financial penalties within Europe.
Mitigation Recommendations
Immediate mitigation should focus on code-level remediation by sanitizing and validating the 'ID' parameter in /pages.php to prevent SQL injection, ideally by implementing parameterized queries or prepared statements. If source code modification is not feasible, deploying a Web Application Firewall (WAF) with rules to detect and block SQL injection attempts targeting the vulnerable parameter can provide interim protection. Conduct a thorough audit of all CMS instances to identify affected versions and isolate or restrict access to vulnerable endpoints. Regularly monitor logs for suspicious activity indicative of SQL injection attempts. Organizations should also consider upgrading to a patched or newer version of the CMS once available. Additionally, implement strict access controls and network segmentation to limit exposure of the CMS to only necessary users and systems. Backup critical data regularly to enable recovery in case of data corruption or loss.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-02T07:52:08.948Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695803d0db813ff03ef8206e
Added to database: 1/2/2026, 5:43:44 PM
Last enriched: 1/2/2026, 5:58:50 PM
Last updated: 1/8/2026, 11:36:24 PM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0731: NULL Pointer Dereference in TOTOLINK WA1200
MediumCVE-2026-0730: Cross Site Scripting in PHPGurukul Staff Leave Management System
MediumCVE-2026-0729: SQL Injection in code-projects Intern Membership Management System
MediumCVE-2025-14436: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in neeraj_slit Brevo for WooCommerce
HighCVE-2025-68718: n/a
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.