Vulnerability Description
A weakness has been identified in code-projects Easy Blog Site up to 1.0. The impacted element is an unknown function of the file /users/contact_us.php. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://code-projects.org/
- https://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/SQL%20Injection%20in%20Eas
- https://vuldb.com/submit/787031
- https://vuldb.com/vuln/356243
- https://vuldb.com/vuln/356243/cti
FAQ
What is CVE-2026-5805?
CVE-2026-5805 is a vulnerability with a CVSS score of 7.3 (HIGH). A weakness has been identified in code-projects Easy Blog Site up to 1.0. The impacted element is an unknown function of the file /users/contact_us.php. Executing a manipulation of the argument Name c...
How severe is CVE-2026-5805?
CVE-2026-5805 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5805?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.