Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0851: SQL Injection in code-projects Online Music Site

0
Medium
VulnerabilityCVE-2026-0851cvecve-2026-0851
Published: Sun Jan 11 2026 (01/11/2026, 23:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Music Site

Description

A vulnerability was identified in code-projects Online Music Site 1.0. The affected element is an unknown function of the file /Administrator/PHP/AdminAddUser.php. The manipulation of the argument txtusername leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:46:28 UTC

Technical Analysis

CVE-2026-0851 identifies a SQL injection vulnerability in the code-projects Online Music Site version 1.0, specifically within the /Administrator/PHP/AdminAddUser.php script. The vulnerability arises from insufficient input validation and sanitization of the txtusername parameter, which is used in SQL queries without proper escaping or parameterization. This flaw allows an unauthenticated remote attacker to inject arbitrary SQL commands, potentially manipulating the backend database. The vulnerability is exploitable over the network without any user interaction or privileges, making it highly accessible to attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the ease of exploitation and the potential for partial impact on confidentiality, integrity, and availability. The vulnerability does not require authentication, increasing its risk profile. Although no active exploitation has been reported, a public exploit exists, which could facilitate automated attacks. The affected software is an online music site platform, which may be deployed by small to medium enterprises or hobbyist sites. The lack of patch links suggests that no official fix has been released yet, emphasizing the need for immediate mitigation steps.

Potential Impact

The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data modification, or deletion. This can compromise user data confidentiality and integrity, and in some cases, affect the availability of the application if destructive queries are executed. Since the vulnerability is remotely exploitable without authentication, attackers can scan and target vulnerable instances en masse, increasing the risk of widespread compromise. Organizations using the affected software may face data breaches, defacement, or loss of user trust. Additionally, attackers could leverage this vulnerability as a foothold for further network penetration or lateral movement. The impact is particularly significant for organizations that store sensitive user information or rely on the integrity of their music site data for business operations.

Mitigation Recommendations

Organizations should immediately audit their deployments of code-projects Online Music Site version 1.0 to identify vulnerable instances. Since no official patch is currently available, recommended mitigations include: 1) Implementing web application firewall (WAF) rules to detect and block SQL injection attempts targeting the txtusername parameter; 2) Applying input validation and sanitization at the application layer, ensuring all user inputs are properly escaped or parameterized before database queries; 3) Restricting access to the /Administrator/PHP/AdminAddUser.php endpoint via network segmentation or IP whitelisting to limit exposure; 4) Monitoring logs for suspicious SQL errors or injection patterns; 5) Planning an upgrade or migration to a patched or alternative platform once available; 6) Conducting regular security assessments and penetration tests to detect similar injection flaws. These steps will reduce the attack surface and mitigate exploitation risks until an official patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-11T09:10:57.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69643809da2266e8389ee33b

Added to database: 1/11/2026, 11:53:45 PM

Last enriched: 2/23/2026, 10:46:28 PM

Last updated: 3/26/2026, 9:14:25 AM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses