Vulnerability Description
A vulnerability was determined in code-projects Online Product Reservation System 1.0. The affected element is an unknown function of the file /app/checkout/delete.php of the component POST Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Online Product Reservation System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkoExploitThird Party Advisory
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkoExploitThird Party Advisory
- https://vuldb.com/?ctiid.339500Permissions RequiredVDB Entry
- https://vuldb.com/?id.339500Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.731128Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-0590?
CVE-2026-0590 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was determined in code-projects Online Product Reservation System 1.0. The affected element is an unknown function of the file /app/checkout/delete.php of the component POST Parameter ...
How severe is CVE-2026-0590?
CVE-2026-0590 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0590?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Online Product Reservation System.