Skip to content
Threat Feed
high advisory

code-projects Online FIR System SQL Injection Vulnerability

A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.

A SQL injection vulnerability has been identified in code-projects Online FIR System version 1.0. The vulnerability resides within the /Login/checklogin.php file, specifically affecting the login component. An attacker can remotely exploit this vulnerability by manipulating the email or password parameters within a request. The vulnerability has been assigned CVE-2026-5665 and given a CVSS v3.1 score of 7.3, indicating a high severity. Public exploits exist, meaning defenders should prioritize detection and mitigation measures. This vulnerability poses a significant risk to organizations using the affected software, as successful exploitation could lead to data breaches, account takeover, or other unauthorized access.

Attack Chain

  1. An attacker identifies a vulnerable instance of code-projects Online FIR System 1.0.
  2. The attacker crafts a malicious HTTP request targeting the /Login/checklogin.php endpoint.
  3. The request includes SQL injection payloads within the email or password parameters.
  4. The application fails to properly sanitize the input, passing the malicious payload to the database.
  5. The database executes the injected SQL code, allowing the attacker to read, modify, or delete data.
  6. The attacker may extract sensitive information such as user credentials or financial records.
  7. The attacker could use the extracted credentials to gain unauthorized access to user accounts.
  8. The attacker could escalate privileges within the system, potentially gaining full control of the application and underlying server.

Impact

Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker could gain unauthorized access to sensitive data, including user credentials, personal information, and financial records. This can lead to identity theft, financial loss, and reputational damage. The number of potential victims depends on the number of installations of the vulnerable Online FIR System. The targeted sectors are unknown, but any organization using this system is at risk.

Recommendation

  • Inspect web server logs for suspicious POST requests to /Login/checklogin.php containing SQL injection attempts using the provided Sigma rule.
  • Apply input validation and sanitization to the email and password parameters in /Login/checklogin.php to prevent SQL injection.
  • Monitor network traffic for connections to or from the known malicious URLs listed in the IOC table.
  • Consider implementing a web application firewall (WAF) rule to block known SQL injection patterns.

Detection coverage 2

Detect SQL Injection Attempts in Online FIR System Login

high

Detects potential SQL injection attempts targeting the /Login/checklogin.php endpoint by searching for common SQL injection keywords in the email or password parameters.

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detect Exploitation of code-projects Online FIR System SQL Injection

critical

Detects possible exploitation of the SQL Injection vulnerability in code-projects Online FIR System 1.0

sigma tactics: initial_access techniques: T1190 sources: webserver, linux

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

1

email

5

url

TypeValue
urlhttps://code-projects.org/
urlhttps://github.com/ahmadmarz10-hub/CVEsMarz/blob/main/SQL%20Injection%20in%20Online%20FIR%20System%20PHP%20email%20Parameter.md
urlhttps://vuldb.com/submit/786310
urlhttps://vuldb.com/vuln/355488
urlhttps://vuldb.com/vuln/355488/cti
email[email protected]