Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5197: SQL Injection in code-projects Student Membership System

0
Medium
VulnerabilityCVE-2026-5197cvecve-2026-5197
Published: Tue Mar 31 2026 (03/31/2026, 10:00:15 UTC)
Source: CVE Database V5
Vendor/Project: code-projects
Product: Student Membership System

Description

CVE-2026-5197 is a medium severity SQL injection vulnerability found in version 1. 0 of the code-projects Student Membership System, specifically in the /delete_user. php file. The vulnerability arises from improper sanitization of the 'ID' parameter, allowing remote attackers to inject malicious SQL code without requiring authentication or user interaction. Exploitation could lead to partial compromise of confidentiality, integrity, and availability of the backend database. Although no public exploits are currently known in the wild, the exploit code has been published, increasing the risk of attacks. The vulnerability affects systems running this specific version of the Student Membership System, which is likely used in educational institutions or organizations managing student memberships. Mitigation requires immediate code review and patching to properly sanitize inputs, implement parameterized queries, and restrict database permissions. Countries with significant deployments of this software or similar educational management systems, including the United States, India, United Kingdom, Canada, Australia, Germany, and Brazil, are at higher risk. Organizations should prioritize remediation to prevent unauthorized data access or manipulation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 10:23:39 UTC

Technical Analysis

CVE-2026-5197 is an SQL injection vulnerability identified in version 1.0 of the code-projects Student Membership System, specifically within the /delete_user.php script. The vulnerability stems from improper handling of the 'ID' parameter, which is susceptible to malicious SQL code injection. This flaw allows remote attackers to manipulate SQL queries executed by the backend database without requiring authentication or user interaction. The vulnerability's CVSS 4.0 base score is 5.3 (medium severity), reflecting its network attack vector, low attack complexity, and no required privileges or user interaction, but limited impact on confidentiality, integrity, and availability. Exploiting this vulnerability could enable attackers to delete or modify user data, extract sensitive information, or disrupt database operations, depending on the database permissions and query context. The vulnerability affects only version 1.0 of the Student Membership System, a product likely used by educational institutions or organizations managing student memberships. No official patches have been released yet, and while no known exploits are active in the wild, the public availability of exploit code increases the risk of exploitation. The vulnerability highlights the need for secure coding practices, including input validation and use of parameterized queries to prevent SQL injection attacks.

Potential Impact

The potential impact of CVE-2026-5197 includes unauthorized data manipulation or deletion, exposure of sensitive student or membership information, and disruption of system availability. Attackers exploiting this vulnerability could compromise the integrity of the membership database by deleting or altering user records, potentially leading to denial of service or data loss. Confidentiality could be partially impacted if attackers extract data through crafted SQL queries. Since the vulnerability requires no authentication and can be exploited remotely, it poses a significant risk to organizations using the affected software. Educational institutions and organizations managing student memberships could face operational disruptions, reputational damage, and regulatory compliance issues related to data breaches. The scope is limited to deployments of version 1.0 of the Student Membership System, but given the public exploit availability, the risk of widespread attacks is elevated until mitigations are applied.

Mitigation Recommendations

To mitigate CVE-2026-5197, organizations should immediately audit and update the /delete_user.php code to implement proper input validation and sanitization for the 'ID' parameter. The use of parameterized queries or prepared statements is essential to prevent SQL injection. Restrict database user permissions to the minimum necessary, avoiding excessive privileges that could amplify the impact of an injection attack. If possible, upgrade to a patched version of the software once released by the vendor. In the interim, consider deploying web application firewalls (WAFs) with SQL injection detection rules to block malicious payloads targeting the vulnerable endpoint. Conduct thorough security testing, including static and dynamic code analysis, to identify and remediate similar injection flaws elsewhere in the application. Monitor logs for suspicious activity related to /delete_user.php and the 'ID' parameter to detect potential exploitation attempts. Educate developers on secure coding practices to prevent recurrence of such vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-30T22:24:06.315Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cb9d1de6bfc5ba1d052b2c

Added to database: 3/31/2026, 10:08:29 AM

Last enriched: 3/31/2026, 10:23:39 AM

Last updated: 3/31/2026, 11:31:06 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses