A vulnerability was determined in code-projects Online Product Reservation System 1.0. The affected element is an unknown function of the file /app/checkout/delete.php of the component POST Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_delete.php.md | Exploit Third Party Advisory |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_delete.php.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339500 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339500 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.731128 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-05 13:15
Updated : 2026-01-09 15:07
NVD link : CVE-2026-0590
Mitre link : CVE-2026-0590
CVE.ORG link : CVE-2026-0590
JSON object : View
Products Affected
fabian
- online_product_reservation_system
