CVE-2026-4836
Description
A vulnerability was detected in code-projects Accounting System 1.0. The affected element is an unknown function of the file /my_account/delete.php. Performing a manipulation of the argument cos_id results in sql injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Code-Projects Accounting System 1.0 suffers from a time-based blind SQL injection in the cos_id parameter of /my_account/delete.php, allowing remote unauthenticated attackers to extract sensitive data.
Vulnerability
Overview
The Code-Projects Accounting System version 1.0 contains a time-based blind SQL injection vulnerability in the /my_account/delete.php endpoint. The application fails to properly sanitize the cos_id parameter before incorporating it into an SQL query, and does not use prepared statements [1]. This input validation flaw allows an attacker to inject arbitrary SQL commands through the cos_id field [1].
Exploitation
Method
The vulnerability is exploitable remotely without authentication. An attacker can craft special SQL payloads within the cos_id parameter and use database delay functions such as SLEEP() to induce measurable server response delays [1]. Since the application does not display database error messages, the attack relies on time-based blind SQL injection techniques, enabling the attacker to infer database information based on response timing differences [1].
Impact
Successful exploitation could allow an attacker to enumerate database structures and extract sensitive information, such as user credentials, administrative data, or other records stored in the database [1]. The extent of unauthorized access depends on the privileges of the database account used by the application [1].
Mitigation
Status
As of the publication date (2026-03-26), public exploit code has been released, increasing the risk of active exploitation [1]. The vendor Code-Projects has not yet provided an official patch. The recommended mitigation is to implement input validation, use parameterized queries (prepared statements) for all database interactions, and restrict database account privileges [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.