Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0852: SQL Injection in code-projects Online Music Site

0
Medium
VulnerabilityCVE-2026-0852cvecve-2026-0852
Published: Mon Jan 12 2026 (01/12/2026, 00:02:06 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Music Site

Description

CVE-2026-0852 is a medium severity SQL injection vulnerability in code-projects Online Music Site version 1. 0, specifically in the /Administrator/PHP/AdminUpdateUser. php file. The flaw arises from improper sanitization of the 'ID' parameter, allowing remote attackers to inject malicious SQL commands without authentication or user interaction. Exploitation can lead to partial compromise of confidentiality, integrity, and availability of the backend database. Although no public exploit is confirmed in the wild, the exploit code has been released publicly, increasing the risk of attacks. This vulnerability affects organizations using this specific version of the Online Music Site software, potentially exposing sensitive user or administrative data. European organizations running this software should prioritize patching or mitigating this flaw. Countries with higher adoption of code-projects Online Music Site or with significant music industry presence are more likely to be targeted. Immediate mitigation includes input validation, use of prepared statements, and restricting access to the vulnerable administrative endpoint.

AI-Powered Analysis

AILast updated: 01/19/2026, 07:43:34 UTC

Technical Analysis

CVE-2026-0852 identifies a SQL injection vulnerability in the code-projects Online Music Site version 1.0, specifically within the /Administrator/PHP/AdminUpdateUser.php script. The vulnerability stems from insufficient input validation or sanitization of the 'ID' parameter, which is manipulated to inject arbitrary SQL commands. This flaw allows remote attackers to execute unauthorized SQL queries against the backend database without requiring authentication or user interaction. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the attack vector is network-based (AV:N), with low complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating partial compromise potential. The vulnerability does not affect system components beyond the database and does not involve scope changes or security attribute modifications beyond the database layer. Although no known exploits are currently active in the wild, the public release of exploit code increases the likelihood of exploitation attempts. The lack of available patches necessitates immediate mitigation efforts by affected organizations. This vulnerability primarily threatens organizations using the vulnerable version of the Online Music Site software, potentially exposing administrative user data and enabling unauthorized database manipulation.

Potential Impact

For European organizations using code-projects Online Music Site 1.0, this vulnerability could lead to unauthorized access to sensitive administrative data, manipulation or deletion of user records, and potential disruption of service availability. The partial compromise of confidentiality and integrity could result in data breaches, reputational damage, and regulatory non-compliance, especially under GDPR requirements. Attackers exploiting this flaw could gain insights into user credentials or escalate privileges by modifying database entries. The remote and unauthenticated nature of the attack vector increases the risk of widespread exploitation, particularly in organizations with exposed administrative interfaces. The music industry and related digital service providers in Europe relying on this software may face operational disruptions and data loss. Additionally, the public availability of exploit code lowers the barrier for attackers, increasing the urgency for mitigation. However, the impact is somewhat contained by the limited scope of the vulnerability to a specific administrative function and the absence of known active exploitation campaigns.

Mitigation Recommendations

European organizations should immediately audit their deployment of code-projects Online Music Site to identify any instances of version 1.0. In the absence of an official patch, organizations must implement strict input validation and sanitization on the 'ID' parameter within /Administrator/PHP/AdminUpdateUser.php, ideally replacing vulnerable code with parameterized queries or prepared statements to prevent SQL injection. Restrict network access to the administrative interface using firewalls or VPNs to limit exposure to trusted personnel only. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the vulnerable endpoint. Conduct thorough logging and monitoring of administrative actions and database queries to detect anomalous behavior indicative of exploitation attempts. Regularly back up databases and test restoration procedures to minimize impact from potential data manipulation or deletion. Educate administrators on the risks and signs of exploitation. Finally, engage with the vendor or community to obtain or develop official patches or updated software versions addressing this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-11T09:11:00.474Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69644295da2266e838c90f2a

Added to database: 1/12/2026, 12:38:45 AM

Last enriched: 1/19/2026, 7:43:34 AM

Last updated: 2/6/2026, 1:07:53 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats