CVE-2026-2060: SQL Injection in code-projects Simple Blood Donor Management System
A vulnerability was found in code-projects Simple Blood Donor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /simpleblooddonor/editcampaignform.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
AI Analysis
Technical Summary
CVE-2026-2060 identifies a SQL Injection vulnerability in the Simple Blood Donor Management System version 1.0 developed by code-projects. The vulnerability is located in the /simpleblooddonor/editcampaignform.php file, specifically in the handling of the 'ID' parameter. An attacker can remotely manipulate this parameter without requiring authentication or user interaction, injecting malicious SQL code that the backend database executes. This can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector network-based, low attack complexity, and no privileges or user interaction needed. Although no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of attacks. The Simple Blood Donor Management System is used to manage blood donation campaigns, making the data sensitive and critical for healthcare operations. The lack of patches or official fixes necessitates immediate mitigation through secure coding practices such as input validation and prepared statements. Organizations should also monitor access logs for suspicious activity targeting the vulnerable endpoint. Given the critical nature of healthcare data, exploitation could lead to significant operational disruption and data breaches.
Potential Impact
For European organizations, particularly those involved in healthcare and blood donation services, this vulnerability poses a significant risk. Exploitation could result in unauthorized access to sensitive donor information, manipulation of campaign data, or disruption of blood donation operations. This could undermine trust in healthcare providers, violate data protection regulations such as GDPR, and potentially impact patient care. The availability of exploit code increases the likelihood of attacks, especially targeting organizations that have not applied mitigations. Data integrity issues could lead to incorrect donor information or campaign details, affecting blood supply management. Confidentiality breaches could expose personal health information, leading to legal and reputational consequences. The operational impact could extend to delays or failures in blood donation campaigns, critical in emergency medical scenarios. European healthcare entities must consider these risks seriously to maintain compliance and service continuity.
Mitigation Recommendations
1. Immediately implement input validation on the 'ID' parameter in /simpleblooddonor/editcampaignform.php to ensure only expected numeric or sanitized values are accepted. 2. Refactor the database queries to use parameterized statements or prepared queries to eliminate SQL injection vectors. 3. Restrict access to the editcampaignform.php endpoint via network controls or authentication mechanisms to limit exposure. 4. Conduct a thorough code review of the entire application to identify and remediate similar injection flaws. 5. Monitor web server and database logs for unusual query patterns or repeated access attempts targeting the vulnerable parameter. 6. If possible, isolate the blood donor management system within a segmented network zone to reduce lateral movement risk. 7. Develop and deploy an incident response plan specific to potential data breaches involving donor information. 8. Engage with the vendor or community to obtain or develop official patches or updates. 9. Educate staff on the risks of SQL injection and the importance of timely patching and monitoring. 10. Regularly back up the database and test restoration procedures to minimize downtime in case of an attack.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2026-2060: SQL Injection in code-projects Simple Blood Donor Management System
Description
A vulnerability was found in code-projects Simple Blood Donor Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /simpleblooddonor/editcampaignform.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
AI-Powered Analysis
Technical Analysis
CVE-2026-2060 identifies a SQL Injection vulnerability in the Simple Blood Donor Management System version 1.0 developed by code-projects. The vulnerability is located in the /simpleblooddonor/editcampaignform.php file, specifically in the handling of the 'ID' parameter. An attacker can remotely manipulate this parameter without requiring authentication or user interaction, injecting malicious SQL code that the backend database executes. This can lead to unauthorized data retrieval, modification, or deletion, compromising the confidentiality, integrity, and availability of the system's data. The vulnerability has a CVSS 4.0 base score of 6.9, reflecting medium severity, with attack vector network-based, low attack complexity, and no privileges or user interaction needed. Although no active exploitation in the wild has been reported, the public availability of exploit code increases the risk of attacks. The Simple Blood Donor Management System is used to manage blood donation campaigns, making the data sensitive and critical for healthcare operations. The lack of patches or official fixes necessitates immediate mitigation through secure coding practices such as input validation and prepared statements. Organizations should also monitor access logs for suspicious activity targeting the vulnerable endpoint. Given the critical nature of healthcare data, exploitation could lead to significant operational disruption and data breaches.
Potential Impact
For European organizations, particularly those involved in healthcare and blood donation services, this vulnerability poses a significant risk. Exploitation could result in unauthorized access to sensitive donor information, manipulation of campaign data, or disruption of blood donation operations. This could undermine trust in healthcare providers, violate data protection regulations such as GDPR, and potentially impact patient care. The availability of exploit code increases the likelihood of attacks, especially targeting organizations that have not applied mitigations. Data integrity issues could lead to incorrect donor information or campaign details, affecting blood supply management. Confidentiality breaches could expose personal health information, leading to legal and reputational consequences. The operational impact could extend to delays or failures in blood donation campaigns, critical in emergency medical scenarios. European healthcare entities must consider these risks seriously to maintain compliance and service continuity.
Mitigation Recommendations
1. Immediately implement input validation on the 'ID' parameter in /simpleblooddonor/editcampaignform.php to ensure only expected numeric or sanitized values are accepted. 2. Refactor the database queries to use parameterized statements or prepared queries to eliminate SQL injection vectors. 3. Restrict access to the editcampaignform.php endpoint via network controls or authentication mechanisms to limit exposure. 4. Conduct a thorough code review of the entire application to identify and remediate similar injection flaws. 5. Monitor web server and database logs for unusual query patterns or repeated access attempts targeting the vulnerable parameter. 6. If possible, isolate the blood donor management system within a segmented network zone to reduce lateral movement risk. 7. Develop and deploy an incident response plan specific to potential data breaches involving donor information. 8. Engage with the vendor or community to obtain or develop official patches or updates. 9. Educate staff on the risks of SQL injection and the importance of timely patching and monitoring. 10. Regularly back up the database and test restoration procedures to minimize downtime in case of an attack.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T06:32:59.555Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69862c29f9fa50a62f24b172
Added to database: 2/6/2026, 6:00:09 PM
Last enriched: 2/6/2026, 6:14:29 PM
Last updated: 2/6/2026, 7:10:09 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2062: NULL Pointer Dereference in Open5GS
MediumCVE-2026-23989: CWE-863: Incorrect Authorization in opencloud-eu reva
HighCVE-2026-24418: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2026-24417: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighCVE-2026-24416: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.