CVE-2026-4836
SQL Injection in code-projects Accounting System delete.php
Publication date: 2026-03-26
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| code-projects | accounting_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to perform SQL injection attacks that can lead to unauthorized access, extraction, modification, or deletion of sensitive data, including user and administrative credentials.
Such unauthorized access and data breaches can result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information.
Failure to properly secure the application against this vulnerability could lead to violations of data protection requirements, potentially resulting in legal and financial consequences.
Can you explain this vulnerability to me?
CVE-2026-4836 is a Time-Based Blind SQL Injection vulnerability found in version 1.0 of the Accounting System in PHP, specifically in the cos_id parameter of the /my_account/delete.php endpoint.
The vulnerability occurs because the application does not properly validate or sanitize user input before including it directly in SQL queries without using prepared statements or parameterized queries.
An attacker can inject malicious SQL commands via the cos_id parameter, which is intended to identify and delete customer records.
Since the application does not show database error messages, the attacker uses a time-based blind SQL injection technique by injecting payloads that cause delays (e.g., using the SLEEP() function) to infer database information based on response times.
How can this vulnerability impact me? :
Successful exploitation of this vulnerability can allow an attacker to:
- Enumerate database structures.
- Extract sensitive data, including user and administrative credentials.
- Modify or delete records in the database.
- Potentially gain full administrative access to the system, depending on the privileges of the database account.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by performing a time-based blind SQL injection test on the cos_id parameter of the /my_account/delete.php endpoint.
A proof of concept involves sending a GET request with the cos_id parameter set to a payload that triggers a delay, such as using the SQL function SLEEP(15). If the server response is delayed accordingly, it confirms the vulnerability.
For example, you can use the following curl command to test the vulnerability:
- curl "http://[target]/my_account/delete.php?cos_id=1' AND IF(SLEEP(15),1,0)-- -"
If the response takes significantly longer (around 15 seconds), it indicates the presence of the SQL injection vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Use prepared statements with parameterized queries to handle the cos_id parameter safely, for example: $stmt = $pdo->prepare("DELETE FROM customers WHERE cos_id = ?"); $stmt->execute([$cos_id]);
- Validate and sanitize all user-supplied input rigorously to prevent injection of malicious SQL.
- Apply the principle of least privilege by ensuring the database account used by the application has minimal necessary permissions.
- Implement security monitoring measures such as Web Application Firewalls (WAF) and conduct regular security testing.