CVE-2026-0701
SQL Injection in code-projects IMS add_admin.php Allows Remote Exploit
Publication date: 2026-01-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| code-projects | intern_membership_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-0701 is a SQL injection vulnerability in version 1.0 of the code-projects Intern Membership Management System, specifically in the /intern/admin/add_admin.php file. The vulnerability occurs because the Username parameter is not properly sanitized, allowing an attacker to inject malicious SQL code. This can be exploited remotely, although it requires some level of authentication. The vulnerability is classified under CWE-89 and allows attackers to manipulate SQL queries executed by the system. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact you by compromising the confidentiality, integrity, and availability of the affected system. Attackers exploiting this SQL injection can execute unauthorized SQL commands, potentially exposing sensitive data, modifying or deleting data, and disrupting system operations. Since the exploit is publicly available and remotely exploitable, it poses a moderate risk to systems using the affected software. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for the presence of the vulnerable file `/intern/admin/add_admin.php` and testing the `Username` parameter for SQL injection. Attackers may use Google dorking with queries like `inurl:intern/admin/add_admin.php` to identify vulnerable targets. To detect exploitation attempts on your system, you can monitor web server logs for suspicious requests targeting this file with SQL injection payloads. Specific commands are not documented, but you can use tools like sqlmap to test the parameter remotely, for example: `sqlmap -u "http://target/intern/admin/add_admin.php" --data="Username=admin" --risk=3 --level=5` to test for SQL injection. Additionally, monitoring logs with grep for suspicious SQL keywords in requests to this file can help detect attempts. [1]
What immediate steps should I take to mitigate this vulnerability?
No known countermeasures or mitigations have been documented for this vulnerability. The suggested immediate step is to replace the affected component (the Intern Membership Management System version 1.0) with an alternative product that is not vulnerable. Additionally, restricting access to the vulnerable file, applying web application firewalls to block SQL injection attempts, and monitoring for exploitation attempts can help mitigate risk until a secure version or patch is available. [1]