CVE-2026-7731
Received Received - Intake
SQL Injection in BloodBank Managing System 1.0

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: VulDB

Description
A security vulnerability has been detected in code-projects BloodBank Managing System 1.0. The affected element is an unknown function of the file get_state.php. The manipulation of the argument G_STATE_ID leads to sql injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects bloodbank_managing_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-7731 is an SQL injection vulnerability found in the BloodBank Managing System 1.0, specifically in the PHP file get_state.php and other related files. The vulnerability arises because user input from POST parameters like G_STATE_ID is directly concatenated into SQL queries without proper validation or sanitization.

This flaw allows attackers to inject malicious SQL code by sending crafted POST requests. They can bypass authentication and extract sensitive database information such as MySQL version, database name, user information, and other business data.

The system responds by rendering data within HTML option tags, which facilitates the exposure of this sensitive data to the attacker. Exploitation does not require login credentials and enables further database enumeration.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized access to sensitive database information, such as user data and business-critical information.

Attackers can bypass authentication mechanisms, potentially gaining unauthorized access to the system.

The exposure of database details can lead to further attacks, data breaches, and compromise of the integrity and confidentiality of the system's data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted POST requests targeting the vulnerable PHP files such as get_state.php, get_city.php, or functions.php, specifically manipulating the POST parameter G_STATE_ID to inject SQL code.

A common detection method is to send a POST request with a payload containing SQL injection syntax like UNION SELECT statements and observe if the response reveals database information such as MySQL version or database name.

Example command using curl to test the vulnerability on get_state.php:

  • curl -X POST -d "G_STATE_ID=1' UNION SELECT @@version, database(), user()-- -" http://targetsite/get_state.php

If the response contains database details within the HTML <option> tags, it confirms the presence of the SQL injection vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include validating and sanitizing all user inputs, especially POST parameters like G_STATE_ID, to prevent SQL injection.

Use prepared statements or parameterized queries instead of directly concatenating user input into SQL queries.

Restrict database user permissions to limit the impact of a potential injection.

If possible, apply any available patches or updates from the software vendor addressing this vulnerability.

Monitor and block suspicious POST requests that contain SQL injection patterns at the web application firewall or network level.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The SQL injection vulnerability in the BloodBank Managing System allows attackers to bypass authentication and extract sensitive database information, including potentially sensitive business data. This exposure of sensitive data could lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require the protection of personal and health-related information from unauthorized access.

Since the vulnerability enables remote exploitation without login credentials and facilitates access to sensitive data, it increases the risk of data breaches, which are subject to strict reporting and remediation requirements under these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart