Vulnerability Description
A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Handler. Such manipulation of the argument id/qty leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fabian | Online Product Reservation System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkoExploitThird Party Advisory
- https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkoExploitThird Party Advisory
- https://vuldb.com/?ctiid.339501Permissions RequiredVDB Entry
- https://vuldb.com/?id.339501Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.731129Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-0591?
CVE-2026-0591 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Han...
How severe is CVE-2026-0591?
CVE-2026-0591 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0591?
Check the references section above for vendor advisories and patch information. Affected products include: Fabian Online Product Reservation System.