CVE-2026-0565

MEDIUM6.9/ 10.0
Share:
Published: January 2, 2026 at 02:15 PM
Modified: January 13, 2026 at 10:26 PM
Source: cna@vuldb.com

Vulnerability Description

A weakness has been identified in code-projects Content Management System 1.0. This issue affects some unknown processing of the file /admin/delete.php. Executing manipulation of the argument del can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: cna@vuldb.com
Source: nvd@nist.gov

AI Security Analysis

01 // Technical Summary

Code-projects Content Management System 1.0 is vulnerable to a critical SQL injection flaw. This vulnerability, exploitable remotely through the /admin/delete.php file, allows attackers to inject malicious SQL code, potentially leading to database compromise, data exfiltration, and complete system takeover. The availability of a public exploit significantly increases the risk of widespread exploitation.

02 // Vulnerability Mechanism

Step 1: Identify the Target: The attacker identifies a target system running code-projects Content Management System 1.0.

Step 2: Access the Vulnerable File: The attacker accesses the /admin/delete.php file, which is likely accessible after successful admin login.

Step 3: Craft the Malicious Payload: The attacker crafts a malicious SQL injection payload designed to achieve a specific goal, such as retrieving sensitive data, creating a new administrative user, or deleting data.

Step 4: Inject the Payload: The attacker injects the crafted payload into the del parameter of the /admin/delete.php file, typically via a GET or POST request.

Step 5: Execute the Query: The vulnerable script executes the attacker-supplied SQL code.

Step 6: Exploit the Result: Depending on the payload, the attacker can then retrieve data, modify the database, or gain further access to the system.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and sanitization of the del parameter within the /admin/delete.php script. The script likely directly incorporates user-supplied input from the del parameter into a SQL query without proper escaping or filtering. This allows an attacker to craft a malicious SQL payload that, when executed, can manipulate the database. The root cause is a failure to implement prepared statements or other secure methods for handling user input within SQL queries. The lack of proper input validation allows for the injection of malicious SQL commands, leading to unauthorized database access and modification.

CVE-2026-0565 - MEDIUM Severity (6.9) | Free CVE Database | 4nuxd