CVE-2026-6160
Received Received - Intake
Information Exposure in Simple ChatBox 1.0 Endpoint via Remote Manipulation

Publication date: 2026-04-13

Last updated on: 2026-04-13

Assigner: VulDB

Description
A vulnerability was found in code-projects Simple ChatBox 1.0. Affected by this issue is the function SimpleChatbox_PHP of the file chatbox.sql of the component Endpoint. Performing a manipulation results in file and directory information exposure. It is possible to initiate the attack remotely. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-04-13
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects simple_chatbox 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-538 The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability leads to exposure of sensitive information including chat messages, usernames, and plaintext passwords due to an exposed SQL database backup file accessible without authentication.

Such exposure can result in privacy violations and credential theft, which may cause non-compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive data.

Failure to protect sensitive information as described could lead to breaches of confidentiality and data security requirements mandated by these standards.


Can you explain this vulnerability to me?

CVE-2026-6160 is a vulnerability in Simple ChatBox PHP version 1.0 where a database backup file named chatbox.sql is publicly accessible on the web server without any authentication or authorization.

This file contains the entire database schema and stored data, including chat messages, usernames, and passwords in plaintext. Because the web server allows direct access to .sql files inside the web root, an attacker can remotely download this sensitive information simply by navigating to the file's URL.

The root cause is improper server configuration and insecure handling of backup files, leading to exposure of sensitive information.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including exposure of sensitive information such as chat messages, usernames, and passwords.

Attackers can steal credentials, compromise user accounts, and gain insight into the application structure and internal data relationships.

Such exposure can lead to privacy violations, unauthorized access, and further attacks on the application or its users.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the SQL database backup file `chatbox.sql` is publicly accessible via HTTP without authentication.

A simple detection method is to attempt to access the URL path where the backup file is expected, for example: `http://<your-server>/SimpleChatbox_PHP/chatbox/database/chatbox.sql`.

If the file is accessible, it indicates the vulnerability is present.

On the server, you can use commands to find `.sql` files inside the web root directory, for example:

  • find /var/www/html -name '*.sql'

You can also use curl or wget to test access remotely:

  • curl -I http://<your-server>/SimpleChatbox_PHP/chatbox/database/chatbox.sql
  • wget --spider http://<your-server>/SimpleChatbox_PHP/chatbox/database/chatbox.sql

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the SQL backup files from any publicly accessible web root directories.

Store backup files in non-public directories such as `/var/backups/` where they are not accessible via the web server.

Restrict access to `.sql` files by configuring the web server to deny access to these files.

  • For Apache, add the following directive to your configuration or `.htaccess` file: `<Files "*.sql"> Require all denied </Files>`
  • For Nginx, add this location block: `location ~* \.sql$ { deny all; }`

Additionally, disable directory listing and apply strict file permissions to sensitive files.

Conduct regular security audits to ensure no sensitive files are exposed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart