CVE-2026-0583

A security flaw has been discovered in code-projects Online Product Reservation System 1.0. This vulnerability affects unknown code of the file app/user/login.php of the component User Login. The manipulation of the argument emailadd results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*

History

09 Jan 2026, 14:35

Type Values Removed Values Added
References () https://code-projects.org/ - () https://code-projects.org/ - Product
References () https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_login.php.md - () https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_login.php.md - Exploit, Third Party Advisory
References () https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_login.php.md#poc - () https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_login.php.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.339475 - () https://vuldb.com/?ctiid.339475 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339475 - () https://vuldb.com/?id.339475 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.731093 - () https://vuldb.com/?submit.731093 - Third Party Advisory, VDB Entry
First Time Fabian online Product Reservation System
Fabian
CPE cpe:2.3:a:fabian:online_product_reservation_system:1.0:*:*:*:*:*:*:*

05 Jan 2026, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-05 10:15

Updated : 2026-01-09 14:35


NVD link : CVE-2026-0583

Mitre link : CVE-2026-0583

CVE.ORG link : CVE-2026-0583


JSON object : View

Products Affected

fabian

  • online_product_reservation_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')