Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0851: SQL Injection in code-projects Online Music Site

0
Medium
VulnerabilityCVE-2026-0851cvecve-2026-0851
Published: Sun Jan 11 2026 (01/11/2026, 23:32:07 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Music Site

Description

CVE-2026-0851 is a medium-severity SQL injection vulnerability found in version 1. 0 of the code-projects Online Music Site, specifically in the /Administrator/PHP/AdminAddUser. php file. The vulnerability arises from improper sanitization of the txtusername parameter, allowing remote attackers to inject malicious SQL commands without authentication or user interaction. Exploitation could lead to unauthorized data access or modification, impacting confidentiality, integrity, and availability of the backend database. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of attack. European organizations using this software, especially those managing user data or payment information, could face data breaches or service disruption. Mitigation requires immediate input validation, parameterized queries, and restricting administrative interface exposure. Countries with higher adoption of this software or significant music industry presence are more likely targets. Given the ease of remote exploitation and potential data impact, the vulnerability demands prompt remediation despite its medium CVSS score.

AI-Powered Analysis

AILast updated: 01/12/2026, 00:08:02 UTC

Technical Analysis

CVE-2026-0851 is a SQL injection vulnerability identified in the code-projects Online Music Site version 1.0, specifically within an unknown function in the /Administrator/PHP/AdminAddUser.php file. The vulnerability stems from improper handling of the txtusername parameter, which is susceptible to injection of malicious SQL code. This flaw allows remote attackers to execute arbitrary SQL commands on the backend database without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the system by potentially allowing unauthorized data retrieval, modification, or deletion. Although no exploits have been observed in the wild, a public exploit is available, increasing the likelihood of exploitation. The vulnerability affects only version 1.0 of the software, which is an online music site platform used to manage users and possibly other sensitive data. The lack of patches or vendor-provided fixes at the time of publication increases the urgency for organizations to implement mitigations. The vulnerability's medium severity rating (CVSS 6.9) reflects the balance between ease of exploitation and the potential impact on affected systems.

Potential Impact

For European organizations using the code-projects Online Music Site 1.0, this vulnerability poses a significant risk to the confidentiality and integrity of user data, including potentially sensitive personal information and payment details. Exploitation could lead to unauthorized access to administrative functions, enabling attackers to manipulate user accounts or extract sensitive data. This could result in data breaches, regulatory non-compliance (e.g., GDPR violations), reputational damage, and financial losses. Additionally, attackers could disrupt service availability by corrupting or deleting database records, impacting business continuity. Organizations in the music industry or those providing online music services are particularly at risk. The presence of a public exploit increases the likelihood of opportunistic attacks, especially against unpatched or poorly secured installations. The vulnerability's remote exploitability without authentication makes it a critical concern for exposed administrative interfaces.

Mitigation Recommendations

1. Immediately restrict access to the /Administrator/PHP/AdminAddUser.php endpoint using network-level controls such as IP whitelisting or VPN access to limit exposure. 2. Implement strict input validation and sanitization on the txtusername parameter to reject malicious input. 3. Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 4. Conduct a comprehensive code audit of the entire application to identify and remediate similar injection flaws. 5. Monitor logs for suspicious activity targeting the administrative interface and unusual database queries. 6. If possible, upgrade to a patched or newer version of the software once available. 7. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this endpoint. 8. Educate system administrators about the risk and ensure secure configuration of the application and underlying database. 9. Regularly back up databases and verify restoration procedures to minimize impact in case of data corruption or loss.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-11T09:10:57.660Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69643809da2266e8389ee33b

Added to database: 1/11/2026, 11:53:45 PM

Last enriched: 1/12/2026, 12:08:02 AM

Last updated: 1/12/2026, 3:48:25 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats