Vulnerability Description
A security vulnerability has been detected in code-projects Online Product Reservation System 1.0. This impacts an unknown function of the file /handgunner-administrator/adminlogin.php of the component Administrator Login. Such manipulation of the argument emailadd/pass leads to sql injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Online Product Reservation System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_admin_ExploitThird Party Advisory
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_admin_ExploitThird Party Advisory
- https://vuldb.com/?ctiid.339459Permissions RequiredVDB Entry
- https://vuldb.com/?id.339459Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.731011Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-0575?
CVE-2026-0575 is a vulnerability with a CVSS score of 7.3 (HIGH). A security vulnerability has been detected in code-projects Online Product Reservation System 1.0. This impacts an unknown function of the file /handgunner-administrator/adminlogin.php of the componen...
How severe is CVE-2026-0575?
CVE-2026-0575 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0575?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Online Product Reservation System.