CVE-2026-5197
SQL Injection in Student Membership System /delete_user.php Allows Remote Exploit
Publication date: 2026-03-31
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| code-projects | student_membership_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-5197 is a SQL Injection vulnerability found in the Student Membership System version 1.0, specifically in the file delete_user.php.
The vulnerability occurs because the user deletion function directly uses the 'id' parameter from user input ($_POST['id']) in an SQL DELETE statement without any sanitization or parameterization.
This allows an attacker to manipulate the 'id' parameter to execute arbitrary SQL commands, such as deleting all users in the database by using a crafted input like id=1' OR '1'='1.
How can this vulnerability impact me? :
The impact of this vulnerability is severe.
- An attacker can delete all administrator accounts, causing loss of system administration privileges.
- An attacker can delete the entire user table, potentially leading to system failure.
Overall, this can result in significant disruption of the system's functionality and compromise of data integrity.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by testing the /delete_user.php endpoint for SQL injection by manipulating the POST parameter 'id'.
A simple test command using curl to check for SQL injection might be:
- curl -X POST -d "id=1' OR '1'='1" http://your-target-domain/delete_user.php
If the response indicates that all users were deleted or if the system behaves abnormally, it confirms the presence of the SQL injection vulnerability.
Additionally, reviewing the source code for direct concatenation of user input into SQL queries without sanitization, such as the snippet: $id = $_POST['id']; mysql_query("delete from user where user='$id'"); can help detect the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the vulnerable SQL query with prepared statements using PDO or MySQLi to prevent SQL injection.
- Implement strict type validation and escaping of all user inputs, especially the 'id' parameter.
- Restrict access to the /delete_user.php endpoint to authorized users only.
- Apply input validation to ensure only valid user IDs are accepted.
These steps will help prevent attackers from injecting malicious SQL commands and protect the integrity of the user database.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The SQL injection vulnerability in the Student Membership System 1.0 allows an attacker to delete user data, including administrator accounts and potentially the entire user table. This unauthorized manipulation and potential loss of user data can lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require the protection of personal data against unauthorized access, alteration, or destruction.
Specifically, the vulnerability could result in data integrity and availability issues, violating principles of data security mandated by these regulations. Organizations using the affected system may face compliance risks due to the potential exposure and loss of sensitive user information.