code-projects Feedback System 1.0 SQL Injection Vulnerability (CVE-2026-8098)
A SQL injection vulnerability exists in code-projects Feedback System 1.0 via manipulation of the email parameter in /admin/checklogin.php, potentially allowing remote attackers to execute arbitrary SQL commands.
A SQL injection vulnerability, identified as CVE-2026-8098, has been discovered in code-projects Feedback System version 1.0. The vulnerability resides in the /admin/checklogin.php file and can be exploited by manipulating the email argument. This allows for the injection of arbitrary SQL commands. The vulnerability is remotely exploitable, and a public exploit is available, increasing the risk of potential attacks. This vulnerability poses a significant threat to systems running the affected software, potentially leading to data breaches, unauthorized access, and complete system compromise.
Attack Chain
- Attacker identifies a vulnerable code-projects Feedback System 1.0 instance.
- Attacker crafts a malicious HTTP request targeting
/admin/checklogin.php. - The HTTP request includes a specially crafted
emailparameter containing SQL injection payloads. - The application fails to properly sanitize the
emailinput, passing it directly to an SQL query. - The injected SQL code is executed against the application’s database.
- The attacker retrieves sensitive data, such as usernames, passwords, or other confidential information.
- The attacker may use the injected SQL to modify or delete data within the database.
- The attacker gains unauthorized administrative access to the Feedback System.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-8098) in code-projects Feedback System 1.0 can lead to the complete compromise of the affected system. An attacker could gain unauthorized access to sensitive data, modify or delete information, and potentially take control of the entire server. This could result in significant data breaches, financial losses, and reputational damage for organizations using the vulnerable software. Given the availability of a public exploit, the risk of widespread exploitation is elevated.
Recommendation
- Deploy the Sigma rule
Detect CVE-2026-8098 Exploitation — SQL Injection in code-projects Feedback Systemto your SIEM to identify exploitation attempts targeting the vulnerable endpoint/admin/checklogin.php. - Apply input validation and sanitization to the
emailparameter in/admin/checklogin.phpto prevent SQL injection, addressing the root cause of CVE-2026-8098. - Monitor web server logs for suspicious POST requests to
/admin/checklogin.phpcontaining SQL keywords or syntax in theemailparameter. - Upgrade to a patched version of code-projects Feedback System that addresses this SQL injection vulnerability as soon as it becomes available.
Detection coverage 2
Detect CVE-2026-8098 Exploitation — SQL Injection in code-projects Feedback System
highDetects CVE-2026-8098 exploitation — HTTP POST to /admin/checklogin.php with SQL injection attempts in the email parameter
Detect Suspicious SQL Error Messages
mediumDetects possible SQL injection attempts by looking for SQL error messages in the web server logs.
Detection queries are available on the platform. Get full rules →