Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4900: Files or Directories Accessible in code-projects Online Food Ordering System

0
Medium
VulnerabilityCVE-2026-4900cvecve-2026-4900
Published: Thu Mar 26 2026 (03/26/2026, 21:56:46 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Online Food Ordering System

Description

CVE-2026-4900 is a medium-severity vulnerability in code-projects Online Food Ordering System version 1. 0 that allows remote attackers to access files or directories, specifically the /dbfood/localhost. sql file. This vulnerability requires no authentication or user interaction and can be exploited over the network due to improper configuration or access controls. The exposure of the localhost. sql file could lead to leakage of sensitive database information, potentially compromising confidentiality. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of exploitation. Organizations using this system should promptly review and modify configuration settings to restrict unauthorized file access. The vulnerability has a CVSS 4. 0 base score of 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 22:16:17 UTC

Technical Analysis

CVE-2026-4900 identifies a vulnerability in the code-projects Online Food Ordering System version 1.0, where an attacker can remotely access files or directories that should be protected. The affected file is /dbfood/localhost.sql, which likely contains database credentials or schema information. The vulnerability arises from improper access controls or misconfiguration that allows unauthenticated, remote attackers to retrieve sensitive files directly via network requests. The CVSS 4.0 vector indicates no privileges or user interaction are required, and the attack complexity is low, making exploitation straightforward. The vulnerability does not affect integrity or availability directly but compromises confidentiality by exposing sensitive internal files. Although no active exploits have been reported in the wild, public exploit code availability increases the risk of exploitation by opportunistic attackers. The root cause is likely a failure to restrict direct access to backend files or directories in the web server or application configuration. The recommended remediation involves modifying configuration settings to enforce proper access controls, such as disabling directory listing, restricting file access via web server rules, or moving sensitive files outside the web root. Since the product is an online food ordering system, the exposure of database files could lead to leakage of customer data, order information, or internal system details, which could be leveraged for further attacks or data theft.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive information contained in the localhost.sql file, which may include database credentials, schema details, or other confidential data. This can lead to further compromise of the backend database, enabling attackers to access customer data, order histories, payment information, or internal system configurations. Such data breaches can damage organizational reputation, lead to regulatory penalties, and cause financial losses. Additionally, attackers could use the disclosed information to escalate attacks, such as SQL injection or privilege escalation. Since the vulnerability requires no authentication and can be exploited remotely, the attack surface is broad, affecting any exposed instance of the vulnerable system. The availability of public exploit code increases the likelihood of exploitation attempts. Organizations relying on this system, especially those handling sensitive customer data, face increased risk of data breaches and operational disruption if the vulnerability is not addressed promptly.

Mitigation Recommendations

To mitigate CVE-2026-4900, organizations should: 1) Immediately review and update web server and application configurations to restrict access to sensitive files such as /dbfood/localhost.sql. This includes disabling directory listing and implementing strict access control rules (e.g., using .htaccess or equivalent). 2) Move sensitive files outside the web root directory to prevent direct URL access. 3) Implement proper authentication and authorization checks for accessing backend files and directories. 4) Regularly audit the web application and server configurations to detect and remediate any inadvertent exposures. 5) Monitor network traffic and logs for unusual access patterns targeting sensitive files. 6) Apply any vendor patches or updates if and when they become available. 7) Consider deploying Web Application Firewalls (WAFs) to block unauthorized file access attempts. 8) Educate development and operations teams on secure configuration management to prevent similar issues in future deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-26T14:33:58.586Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5ac523c064ed76fd41c3d

Added to database: 3/26/2026, 9:59:46 PM

Last enriched: 3/26/2026, 10:16:17 PM

Last updated: 3/26/2026, 11:05:30 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses