Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3711: SQL Injection in code-projects Simple Flight Ticket Booking System

0
Medium
VulnerabilityCVE-2026-3711cvecve-2026-3711
Published: Sun Mar 08 2026 (03/08/2026, 06:02:08 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Simple Flight Ticket Booking System

Description

CVE-2026-3711 is a medium-severity SQL injection vulnerability affecting version 1. 0 of the code-projects Simple Flight Ticket Booking System. The flaw exists in an unknown function within the /Adminupdate. php file, where manipulation of parameters such as flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, and bp can lead to SQL injection. This vulnerability can be exploited remotely without user interaction but requires high privileges. Although no known exploits are currently observed in the wild, the exploit code is publicly available. The vulnerability impacts confidentiality, integrity, and availability of the backend database with limited scope and complexity. Organizations using this booking system should prioritize patching or implementing mitigations to prevent unauthorized data access or modification.

AI-Powered Analysis

AILast updated: 03/08/2026, 06:22:14 UTC

Technical Analysis

CVE-2026-3711 identifies a SQL injection vulnerability in the Simple Flight Ticket Booking System version 1.0 developed by code-projects. The vulnerability resides in an unspecified function within the /Adminupdate.php file, where multiple input parameters related to flight details (flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, bp) are improperly sanitized or validated before being incorporated into SQL queries. This allows an attacker with high privileges to remotely inject malicious SQL code, potentially manipulating the backend database. The vulnerability does not require user interaction but does require authentication with elevated privileges, limiting the attack surface. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no user interaction (UI:N), and high privileges required (PR:H). The impact on confidentiality, integrity, and availability is low to limited, suggesting partial data exposure or modification rather than full system compromise. No patches or fixes have been linked yet, and while exploit code is public, no active exploitation has been reported. This vulnerability highlights the risks of insufficient input validation in web applications managing critical flight booking data.

Potential Impact

The SQL injection vulnerability could allow an authenticated attacker with high privileges to execute arbitrary SQL commands on the backend database, leading to unauthorized data access, modification, or deletion. This could compromise sensitive flight booking information, customer data, and operational records. Although the impact is rated medium due to the requirement for high privileges and limited scope, exploitation could disrupt booking operations, damage data integrity, and erode customer trust. Organizations relying on this system may face regulatory compliance issues if customer data is exposed. The availability of public exploit code increases the risk of future attacks, especially if the system remains unpatched. The vulnerability could also serve as a foothold for further lateral movement within the network.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately review and sanitize all inputs to the /Adminupdate.php script, especially the parameters flightno, airplaneid, departure, dtime, arrival, atime, ec, ep, bc, and bp. Implement parameterized queries or prepared statements to prevent SQL injection. Restrict access to the administrative interface to trusted IP addresses and enforce strong authentication and authorization controls to limit high-privilege access. Conduct a thorough code audit of the booking system to identify and remediate similar injection flaws. Monitor logs for suspicious database queries or unusual admin activity. If patches become available from the vendor, apply them promptly. Additionally, consider deploying web application firewalls (WAFs) with SQL injection detection rules tailored to this application’s traffic patterns. Regularly back up databases and test recovery procedures to minimize impact from potential data corruption.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T09:12:58.721Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ad12452904315ca36fe67f

Added to database: 3/8/2026, 6:08:05 AM

Last enriched: 3/8/2026, 6:22:14 AM

Last updated: 3/8/2026, 8:11:49 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses