CVE-2026-5666
Received Received - Intake
Insecure Storage Vulnerability in Online FIR System SQL Backup

Publication date: 2026-04-06

Last updated on: 2026-04-06

Assigner: VulDB

Description
A vulnerability was detected in code-projects Online FIR System 1.0. Affected by this issue is some unknown functionality of the file /complaints.sql of the component SQL Database Backup File Handler. The manipulation results in insecure storage of sensitive information. The attack may be performed from remote. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-06
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-04-06
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects online_fir_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-922 The product stores sensitive information without properly limiting read or write access by unauthorized actors.
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5666 is a vulnerability in the Online FIR System version 1.0 that involves the insecure storage and exposure of sensitive information. Specifically, a database backup file named "complaints.sql" is stored within a publicly accessible directory inside the web root. Because the web server does not restrict access to files with the ".sql" extension, any unauthenticated user can directly access and download this database dump via HTTP.

This exposed SQL dump contains the full database schema and stored application data, including sensitive information such as user accounts, complaint records, and administrative data. The root cause is insecure deployment and server misconfiguration, allowing unauthorized actors to access sensitive data without authentication.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information stored in the database backup file. Attackers can download the entire database dump, gaining access to user credentials, complaint records, and administrative data.

Such exposure can result in privacy breaches, identity theft, unauthorized access to user accounts, and potential misuse of administrative data. Since the exploit is publicly available and can be performed remotely without authentication, the risk of exploitation is significant.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the SQL database backup file "complaints.sql" is publicly accessible via HTTP without authentication.

A simple method is to attempt to access the URL where the file might be hosted, for example: http://localhost/Online_FIR_System/complaints.sql

If the file is accessible and downloadable, the vulnerability exists.

Additionally, you can scan your web server directories for publicly accessible ".sql" files.

Suggested commands include:

  • Using curl or wget to test access: curl -I http://yourserver/Online_FIR_System/complaints.sql
  • Using find command on the server to locate .sql files in the web root: find /var/www/html -name "*.sql"
  • Using a web vulnerability scanner to detect exposed backup files or sensitive files accessible without authentication.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the SQL backup files from the web root directory and storing them in secure, non-public directories such as "/var/backups/".

Restrict access to ".sql" files via web server configuration to prevent unauthorized access.

  • For Apache servers, add the following directive to deny access to .sql files: <Files "*.sql"> Require all denied </Files>
  • For Nginx servers, add this location block to deny access: location ~* \.sql$ { deny all; }

Additional security measures include disabling directory listing, applying strict file permissions, and regularly auditing exposed resources to prevent unauthorized access.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability results in the insecure storage and exposure of sensitive information through an exposed SQL database backup file accessible without authentication. Such exposure can lead to unauthorized access to personal and sensitive data, which is a violation of data protection principles.

Because sensitive user data and complaint records can be accessed publicly, this vulnerability undermines compliance with common standards and regulations like GDPR and HIPAA, which require strict protection of personal and sensitive information to prevent unauthorized disclosure.

The root cause being security misconfiguration and exposure of sensitive data aligns with violations of these regulations' requirements for data confidentiality, integrity, and access controls.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart