Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3710: SQL Injection in code-projects Simple Flight Ticket Booking System

0
Medium
VulnerabilityCVE-2026-3710cvecve-2026-3710
Published: Sun Mar 08 2026 (03/08/2026, 05:32:10 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Flight Ticket Booking System

Description

CVE-2026-3710 is a medium severity SQL injection vulnerability found in version 1. 0 of the code-projects Simple Flight Ticket Booking System. The flaw exists in the /Adminadd. php file, where manipulation of parameters such as flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, and bp can lead to SQL injection. This vulnerability allows remote attackers to execute unauthorized SQL commands without requiring user interaction, but does require high privileges. Although no public exploits are currently known in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability impacts confidentiality, integrity, and availability of the affected system, but the scope is limited to the specific product and version. Organizations using this booking system should prioritize patching or applying mitigations to prevent potential data breaches or system compromise.

AI-Powered Analysis

AILast updated: 03/08/2026, 06:07:00 UTC

Technical Analysis

CVE-2026-3710 is a SQL injection vulnerability identified in the Simple Flight Ticket Booking System version 1.0 developed by code-projects. The vulnerability resides in the /Adminadd.php script, where multiple input parameters including flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, and bp are improperly sanitized. This improper input validation allows an attacker with high privileges to inject malicious SQL queries remotely, potentially manipulating the backend database. The CVSS 4.0 base score is 5.1, reflecting a medium severity level due to the requirement of high privileges and the limited scope of impact. The vulnerability affects confidentiality, integrity, and availability by enabling unauthorized data access or modification. No user interaction is required for exploitation, and the attack vector is network-based, making remote exploitation feasible. Although no known exploits are currently active in the wild, the public disclosure of exploit details increases the risk that attackers may develop and deploy exploits. The lack of available patches or updates at the time of disclosure necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The SQL injection vulnerability in the Simple Flight Ticket Booking System can lead to unauthorized access to sensitive flight booking data, manipulation or deletion of records, and potential disruption of booking services. Attackers exploiting this flaw could compromise the confidentiality of passenger information, alter flight schedules or booking details, and degrade system availability. Given the system’s role in managing flight ticket bookings, such impacts could result in financial losses, reputational damage, and regulatory compliance violations for affected organizations. The requirement for high privileges limits the attack surface somewhat, but insider threats or compromised administrative accounts could be leveraged to exploit this vulnerability. The public disclosure of the exploit details increases the likelihood of exploitation attempts, especially in environments where the system remains unpatched or unmitigated.

Mitigation Recommendations

Organizations using the affected Simple Flight Ticket Booking System version 1.0 should immediately review and restrict administrative access to trusted personnel only, minimizing the risk of privilege abuse. Input validation and parameter sanitization should be implemented or enhanced in the /Adminadd.php script to prevent SQL injection, ideally using prepared statements or parameterized queries. If vendor patches or updates become available, they should be applied promptly. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block SQL injection attempts targeting the vulnerable parameters. Regular security audits and code reviews should be conducted to identify and remediate similar vulnerabilities. Additionally, monitoring and logging of administrative actions and database queries can help detect suspicious activities indicative of exploitation attempts. Organizations should also consider isolating the booking system from public networks or restricting access via VPN or other secure channels to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T09:12:55.413Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ad0ead2904315ca36e8d90

Added to database: 3/8/2026, 5:52:45 AM

Last enriched: 3/8/2026, 6:07:00 AM

Last updated: 3/8/2026, 8:00:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses