<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Code-Projects — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/code-projects/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 14:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/code-projects/feed.xml" rel="self" type="application/rss+xml"/><item><title>code-projects Online Hospital Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</link><pubDate>Sat, 02 May 2026 14:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-online-hospital-management-sql-injection/</guid><description>CVE-2026-7632 is a SQL injection vulnerability in code-projects Online Hospital Management System 1.0, allowing a remote attacker to execute arbitrary SQL commands by manipulating the 'delid' argument in the '/viewappointment.php' file.</description><content:encoded><![CDATA[<p>CVE-2026-7632 is a critical security flaw affecting code-projects Online Hospital Management System version 1.0. The vulnerability lies within the <code>/viewappointment.php</code> file, where insufficient input validation allows for SQL injection via the <code>delid</code> argument. A remote attacker can exploit this vulnerability to inject arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The exploit is publicly disclosed, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected system, as it could compromise sensitive patient data and disrupt hospital operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Online Hospital Management System 1.0 running the vulnerable <code>/viewappointment.php</code> script.</li>
<li>The attacker crafts a malicious HTTP request targeting <code>/viewappointment.php</code> with a specially crafted <code>delid</code> parameter containing SQL injection payloads.</li>
<li>The application fails to properly sanitize the <code>delid</code> input, allowing the injected SQL code to be passed to the database.</li>
<li>The injected SQL code is executed against the database server.</li>
<li>The attacker retrieves sensitive data such as patient records, usernames, and passwords from the database using SQL queries like <code>UNION SELECT</code>.</li>
<li>The attacker may modify or delete data within the database.</li>
<li>The attacker could potentially escalate privileges within the application by manipulating user roles or injecting administrative accounts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7632 can lead to severe consequences, including unauthorized access to sensitive patient data, such as medical history, personal information, and financial records. Attackers could modify or delete critical data, disrupting hospital operations and potentially impacting patient care. The vulnerability could also allow attackers to gain control of the system, leading to further malicious activities like data exfiltration or ransomware deployment. This poses a significant risk to the privacy and security of patient information.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection in Online Hospital Management System</code> to your SIEM to identify exploitation attempts targeting the <code>/viewappointment.php</code> endpoint.</li>
<li>Implement input validation and sanitization measures in the <code>/viewappointment.php</code> script to prevent SQL injection attacks.</li>
<li>Upgrade to a patched version of code-projects Online Hospital Management System that addresses CVE-2026-7632 (if available).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>code-projects Plugin 4.1.2cu.5137 Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</link><pubDate>Thu, 30 Apr 2026 22:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-code-projects-buffer-overflow/</guid><description>A buffer overflow vulnerability (CVE-2026-7503) exists in code-projects Plugin 4.1.2cu.5137, allowing a remote attacker to execute arbitrary code by manipulating the 'wepkey2' argument in the 'setWiFiMultipleConfig' function of the '/lib/cste_modules/wireless.so' library, posing a critical risk due to publicly available exploits.</description><content:encoded><![CDATA[<p>A critical buffer overflow vulnerability, identified as CVE-2026-7503, has been discovered in code-projects Plugin version 4.1.2cu.5137. The vulnerability resides within the <code>setWiFiMultipleConfig</code> function in the <code>/lib/cste_modules/wireless.so</code> library, which is part of the <code>/cgi-bin/cstecgi.cgi</code> executable. Successful exploitation is achieved through manipulation of the <code>wepkey2</code> argument, allowing for remote code execution. The vulnerability is considered highly critical due to the availability of a public exploit, increasing the likelihood of widespread exploitation and potential compromise of affected systems. This poses a significant threat to devices utilizing the vulnerable plugin version.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a system running code-projects Plugin 4.1.2cu.5137.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint.</li>
<li>The request includes a specially crafted payload for the <code>wepkey2</code> argument within the <code>setWiFiMultipleConfig</code> function.</li>
<li>The vulnerable function <code>setWiFiMultipleConfig</code> processes the malicious input without proper bounds checking.</li>
<li>The oversized <code>wepkey2</code> argument overflows the buffer, overwriting adjacent memory regions.</li>
<li>The attacker injects malicious code into the memory space via the buffer overflow.</li>
<li>The injected code executes, granting the attacker control over the affected system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7503 can lead to complete system compromise, allowing attackers to execute arbitrary code, steal sensitive information, or cause denial-of-service conditions. Due to the ready availability of an exploit, any system running the vulnerable code-projects plugin version 4.1.2cu.5137 is at immediate risk. The lack of specific victim numbers or sector targeting information in the provided source does not diminish the critical nature of the vulnerability given the high CVSS score (8.8) and public exploit.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Code-Projects WiFi Configuration Buffer Overflow Attempt&rdquo; to your SIEM to detect exploitation attempts targeting the vulnerable <code>setWiFiMultipleConfig</code> function and monitor web server logs (cs-uri-query).</li>
<li>Apply input validation and sanitization to prevent buffer overflows. This issue occurs within the <code>/lib/cste_modules/wireless.so</code> library called by <code>/cgi-bin/cstecgi.cgi</code>.</li>
<li>Monitor network traffic for suspicious requests targeting the <code>/cgi-bin/cstecgi.cgi</code> endpoint, as this is the entry point for exploiting CVE-2026-7503.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>buffer-overflow</category><category>remote-code-execution</category><category>cve-2026-7503</category></item><item><title>Online Lot Reservation System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</link><pubDate>Mon, 27 Apr 2026 15:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-online-lot-sqli/</guid><description>CVE-2026-7131 is a SQL injection vulnerability in code-projects Online Lot Reservation System up to version 1.0, affecting the /loginuser.php component via manipulation of the email/password arguments, which could allow remote attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7131, has been discovered in code-projects Online Lot Reservation System version 1.0 and earlier. This vulnerability is located in the <code>/loginuser.php</code> file and can be exploited by manipulating the <code>email</code> and <code>password</code> arguments. Successful exploitation could allow a remote attacker to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. The vulnerability is remotely exploitable and a public exploit is available, increasing the risk of exploitation. Due to the sensitive nature of lot reservation data, organizations using this system are at risk of significant data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of code-projects Online Lot Reservation System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/loginuser.php</code> file.</li>
<li>Within the request, the attacker injects SQL code into the <code>email</code> or <code>password</code> parameters.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, treating it as a legitimate query.</li>
<li>The attacker gains unauthorized access to the database, potentially reading sensitive information such as user credentials, reservation details, or financial data.</li>
<li>The attacker may modify or delete data within the database, disrupting the system&rsquo;s functionality.</li>
<li>The attacker can potentially use the compromised database to pivot to other systems or escalate privileges within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-7131 can result in unauthorized access to sensitive data within the Online Lot Reservation System. This could include user credentials, reservation details, and financial information. The vulnerability affects systems running code-projects Online Lot Reservation System up to version 1.0. Due to the availability of a public exploit, the risk of exploitation is elevated. A successful attack could lead to data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization techniques to prevent SQL injection attacks within the <code>/loginuser.php</code> file.</li>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempt via Login</code> to identify potential exploitation attempts against the <code>/loginuser.php</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/loginuser.php</code> file, specifically looking for SQL syntax within the <code>email</code> or <code>password</code> parameters.</li>
<li>Review and harden database access controls to limit the impact of successful SQL injection attacks.</li>
<li>Implement a web application firewall (WAF) with rules to detect and block SQL injection attempts.</li>
<li>Disable Javascript to ensure complete website functionality.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve</category></item><item><title>SQL Injection Vulnerability in code-projects Inventory Management System 1.0</title><link>https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</link><pubDate>Mon, 27 Apr 2026 01:16:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-inventory-sql-injection/</guid><description>A SQL injection vulnerability exists in code-projects Inventory Management System 1.0 within the Login component, specifically affecting the Username argument, where a remote attacker can manipulate the Username parameter, leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in code-projects Inventory Management System version 1.0. The vulnerability resides within the Login component and is triggered by manipulating the Username argument. Successful exploitation allows a remote attacker to inject malicious SQL queries, potentially leading to unauthorized access to sensitive data, modification of existing records, or even complete database takeover. The vulnerability, identified as CVE-2026-7070, has a CVSS v3.1 score of 7.3, indicating a high severity. Publicly available exploits exist, increasing the risk of widespread exploitation. This vulnerability poses a significant threat to organizations using the affected Inventory Management System, potentially leading to data breaches and financial losses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a login form within the code-projects Inventory Management System 1.0.</li>
<li>The attacker crafts a malicious SQL injection payload within the Username field of the login form.</li>
<li>The attacker submits the crafted payload through an HTTP POST request to the login endpoint.</li>
<li>The application fails to properly sanitize or validate the input provided in the Username field.</li>
<li>The unsanitized input is directly incorporated into an SQL query executed against the backend database.</li>
<li>The injected SQL code modifies the intended query, allowing the attacker to bypass authentication or extract data.</li>
<li>The database server executes the modified SQL query, potentially returning sensitive information to the attacker or allowing unauthorized data manipulation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can have severe consequences. An attacker can gain unauthorized access to sensitive inventory data, customer information, and financial records. Data modification can lead to incorrect inventory levels, disrupted operations, and financial losses. In a worst-case scenario, the attacker could gain complete control over the database server, leading to a full system compromise. This vulnerability impacts organizations using code-projects Inventory Management System 1.0, potentially affecting their reputation, financial stability, and customer trust.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SQL Injection Attempts in Web Logs</code> to identify potential exploitation attempts targeting the Username field in web server logs.</li>
<li>Apply input validation and sanitization to the Username field in the Login component of code-projects Inventory Management System 1.0 to mitigate CVE-2026-7070.</li>
<li>Monitor web server logs for unusual SQL syntax or error messages indicative of SQL injection attempts based on the <code>Detect SQL Injection Attempts in Web Logs</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>code-projects Employee Management System SQL Injection Vulnerability (CVE-2026-7063)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</link><pubDate>Sun, 26 Apr 2026 23:16:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ems-sqli/</guid><description>CVE-2026-7063 is a SQL Injection vulnerability in code-projects Employee Management System 1.0 via the 'pwd' parameter in /370project/process/eprocess.php, enabling remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-7063, has been discovered in code-projects Employee Management System version 1.0. The vulnerability resides within the <code>/370project/process/eprocess.php</code> file, specifically affecting the <code>pwd</code> argument. Successful exploitation allows a remote attacker to inject and execute arbitrary SQL commands against the application&rsquo;s database. Given that the exploit is publicly available, organizations using this system are at immediate risk of unauthorized data access, modification, or deletion. The affected component is the endpoint processing user input, making it a critical point of failure if not properly secured. This vulnerability poses a significant threat due to its ease of exploitation and potential for widespread data compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an instance of code-projects Employee Management System 1.0 accessible over the network.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/370project/process/eprocess.php</code> endpoint.</li>
<li>Within the HTTP request, the attacker manipulates the <code>pwd</code> parameter, injecting SQL code within the parameter&rsquo;s value.</li>
<li>The server-side code improperly sanitizes or validates the injected SQL code within the <code>pwd</code> parameter.</li>
<li>The application executes the attacker-controlled SQL query against the database.</li>
<li>The attacker bypasses authentication or gains elevated privileges through the successful SQL injection.</li>
<li>The attacker extracts sensitive data from the database, such as user credentials or financial records.</li>
<li>The attacker may modify or delete data within the database, leading to data corruption or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7063) can lead to complete compromise of the affected Employee Management System. An attacker can gain unauthorized access to sensitive employee data, including personal information, salaries, and performance reviews. The attacker could modify or delete critical data, disrupt business operations, or use the compromised system as a launchpad for further attacks within the organization&rsquo;s network. Given the public availability of the exploit, organizations failing to address this vulnerability are at a high risk of experiencing a data breach and associated financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests to <code>/370project/process/eprocess.php</code> containing SQL syntax in the <code>pwd</code> parameter to identify potential exploitation attempts.</li>
<li>Deploy the provided Sigma rule to detect exploitation attempts targeting the vulnerable <code>pwd</code> parameter in the <code>eprocess.php</code> file.</li>
<li>Apply input validation and sanitization to the <code>pwd</code> parameter in <code>/370project/process/eprocess.php</code> to prevent SQL injection, addressing CVE-2026-7063.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2026-7063</category><category>web-application</category></item></channel></rss>