Vulnerability Description
A security vulnerability has been detected in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the file /order_view.php of the component GET Parameter Handler. Such manipulation of the argument transaction_id leads to sql injection. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Online Product Reservation System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_order_ExploitThird Party Advisory
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_order_ExploitThird Party Advisory
- https://vuldb.com/?ctiid.339477Permissions RequiredVDB Entry
- https://vuldb.com/?id.339477Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.731096Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-0585?
CVE-2026-0585 is a vulnerability with a CVSS score of 7.3 (HIGH). A security vulnerability has been detected in code-projects Online Product Reservation System 1.0. Impacted is an unknown function of the file /order_view.php of the component GET Parameter Handler. S...
How severe is CVE-2026-0585?
CVE-2026-0585 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0585?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Online Product Reservation System.