Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0701: SQL Injection in code-projects Intern Membership Management System

0
Medium
VulnerabilityCVE-2026-0701cvecve-2026-0701
Published: Thu Jan 08 2026 (01/08/2026, 08:02:05 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Intern Membership Management System

Description

A vulnerability was identified in code-projects Intern Membership Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /intern/admin/add_admin.php. The manipulation of the argument Username leads to sql injection. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:20:04 UTC

Technical Analysis

CVE-2026-0701 identifies a SQL injection vulnerability in the code-projects Intern Membership Management System version 1.0, specifically within the /intern/admin/add_admin.php script. The vulnerability is triggered by manipulation of the 'Username' parameter, which is not properly sanitized before being used in SQL queries. This flaw allows remote attackers to inject arbitrary SQL commands, potentially enabling unauthorized data access or modification. The attack vector is network-based with no need for user interaction or authentication, increasing the risk of exploitation. However, the CVSS 4.0 vector indicates that privilege is required (PR:H), suggesting that some level of authenticated access might be necessary, which somewhat limits the attack surface. The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L). No patches have been officially released yet, and no known exploits are active in the wild, though public exploit code exists. The vulnerability is categorized as medium severity due to its moderate impact and exploitation complexity. The affected system is likely used in organizational or educational environments to manage intern memberships, making it a target for attackers seeking to access sensitive membership data or disrupt administrative functions.

Potential Impact

The SQL injection vulnerability could allow attackers to execute arbitrary SQL commands on the backend database, leading to unauthorized access to sensitive intern membership data, modification or deletion of records, and potential disruption of system availability. Although exploitation requires some level of privilege, a successful attack could compromise the confidentiality and integrity of membership information, potentially exposing personal data or administrative credentials. This could result in data breaches, reputational damage, and operational disruptions for organizations relying on the affected system. The availability impact is limited but could still affect administrative functions if database integrity is compromised. Since the exploit is publicly available, the risk of exploitation increases over time, especially in environments where the system is exposed to untrusted networks. Organizations with large intern or membership management deployments may face increased risk of targeted attacks aiming to leverage this vulnerability for data theft or system manipulation.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement input validation and sanitization on the 'Username' parameter to prevent SQL injection. Employing parameterized queries or prepared statements in the affected code (/intern/admin/add_admin.php) is critical to eliminate injection vectors. Restricting access to the administrative interface through network segmentation, VPNs, or IP whitelisting can reduce exposure. Monitoring and logging access to the vulnerable endpoint can help detect attempted exploitation. Until an official patch is released, consider deploying Web Application Firewalls (WAFs) with rules to block SQL injection patterns targeting this parameter. Conduct code reviews and security testing to identify and remediate similar injection flaws elsewhere in the application. Educate administrators about the risks and signs of exploitation. Finally, maintain regular backups of membership data to enable recovery in case of data corruption or loss.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-07T21:39:05.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695f68bec901b06321bec204

Added to database: 1/8/2026, 8:20:14 AM

Last enriched: 2/23/2026, 11:20:04 PM

Last updated: 3/24/2026, 12:28:30 AM

Views: 109

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses