A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Handler. Such manipulation of the argument id/qty leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_update.php.md | Exploit Third Party Advisory |
| https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_update.php.md#poc | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.339501 | Permissions Required VDB Entry |
| https://vuldb.com/?id.339501 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.731129 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-05 14:15
Updated : 2026-01-09 14:59
NVD link : CVE-2026-0591
Mitre link : CVE-2026-0591
CVE.ORG link : CVE-2026-0591
JSON object : View
Products Affected
fabian
- online_product_reservation_system
