Vehicle Showroom Management System SQL Injection Vulnerability (CVE-2026-6038)
A remote SQL injection vulnerability (CVE-2026-6038) exists in the code-projects Vehicle Showroom Management System 1.0, specifically affecting the /util/RegisterCustomerFunction.php file by manipulating the BRANCH_ID argument.
A SQL injection vulnerability, identified as CVE-2026-6038, has been discovered in version 1.0 of the code-projects Vehicle Showroom Management System. This vulnerability resides within the /util/RegisterCustomerFunction.php file, and can be exploited by manipulating the BRANCH_ID argument. The vulnerability allows for remote exploitation, meaning an attacker does not need local access to the system. Publicly available exploit code exists, increasing the likelihood of exploitation. Successful exploitation could allow an attacker to read, modify, or delete sensitive data within the application’s database. This vulnerability was published on 2026-04-10.
Attack Chain
- Attacker identifies a vulnerable instance of Vehicle Showroom Management System 1.0.
- Attacker crafts a malicious HTTP request targeting
/util/RegisterCustomerFunction.php. - The crafted request includes a SQL injection payload within the
BRANCH_IDparameter. - The application fails to properly sanitize the
BRANCH_IDinput. - The unsanitized input is incorporated into a SQL query executed by the application.
- The SQL injection payload manipulates the query to extract sensitive data or modify database records.
- The application returns the results of the manipulated query to the attacker.
Impact
Successful exploitation of CVE-2026-6038 can lead to unauthorized access to the Vehicle Showroom Management System’s database. This could result in the disclosure of sensitive customer information (names, addresses, financial details), modification of vehicle inventory data, or even complete compromise of the application’s data integrity. The impact would depend on the level of privileges the application’s database user has and the attacker’s objectives, but it is a high-severity vulnerability due to the ease of exploitation and potential for significant data breach or manipulation.
Recommendation
- Inspect web server logs for suspicious POST requests to
/util/RegisterCustomerFunction.phpcontaining unusual characters or SQL keywords in theBRANCH_IDparameter using the Sigma rule “Detect SQL Injection Attempt via BRANCH_ID Parameter”. - Apply input validation and sanitization to the
BRANCH_IDparameter within the/util/RegisterCustomerFunction.phpfile to prevent SQL injection. - Monitor database logs for anomalous queries originating from the Vehicle Showroom Management System’s application user.
Detection coverage 2
Detect SQL Injection Attempt via BRANCH_ID Parameter
highDetects potential SQL injection attempts targeting the BRANCH_ID parameter in the /util/RegisterCustomerFunction.php file.
Detect Direct Access to RegisterCustomerFunction.php
mediumDetects direct access attempts to the RegisterCustomerFunction.php file, which may indicate reconnaissance or exploit attempts.
Detection queries are kept inside the platform. Get full rules →