<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5665 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5665/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 16:16:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5665/feed.xml" rel="self" type="application/rss+xml"/><item><title>code-projects Online FIR System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-fir-sqli/</link><pubDate>Mon, 06 Apr 2026 16:16:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-fir-sqli/</guid><description>A SQL injection vulnerability in code-projects Online FIR System 1.0 allows remote attackers to execute arbitrary SQL commands by manipulating the email or password parameters in the /Login/checklogin.php file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Online FIR System version 1.0. The vulnerability resides within the <code>/Login/checklogin.php</code> file, specifically affecting the login component. An attacker can remotely exploit this vulnerability by manipulating the <code>email</code> or <code>password</code> parameters within a request. The vulnerability has been assigned CVE-2026-5665 and given a CVSS v3.1 score of 7.3, indicating a high severity. Public exploits exist, meaning defenders should prioritize detection and mitigation measures. This vulnerability poses a significant risk to organizations using the affected software, as successful exploitation could lead to data breaches, account takeover, or other unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of code-projects Online FIR System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/Login/checklogin.php</code> endpoint.</li>
<li>The request includes SQL injection payloads within the <code>email</code> or <code>password</code> parameters.</li>
<li>The application fails to properly sanitize the input, passing the malicious payload to the database.</li>
<li>The database executes the injected SQL code, allowing the attacker to read, modify, or delete data.</li>
<li>The attacker may extract sensitive information such as user credentials or financial records.</li>
<li>The attacker could use the extracted credentials to gain unauthorized access to user accounts.</li>
<li>The attacker could escalate privileges within the system, potentially gaining full control of the application and underlying server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker could gain unauthorized access to sensitive data, including user credentials, personal information, and financial records. This can lead to identity theft, financial loss, and reputational damage. The number of potential victims depends on the number of installations of the vulnerable Online FIR System. The targeted sectors are unknown, but any organization using this system is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/Login/checklogin.php</code> containing SQL injection attempts using the provided Sigma rule.</li>
<li>Apply input validation and sanitization to the <code>email</code> and <code>password</code> parameters in <code>/Login/checklogin.php</code> to prevent SQL injection.</li>
<li>Monitor network traffic for connections to or from the known malicious URLs listed in the IOC table.</li>
<li>Consider implementing a web application firewall (WAF) rule to block known SQL injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-5665</category><category>web-application</category></item></channel></rss>