VYPR
Medium severity6.3NVD Advisory· Published Mar 27, 2026· Updated Apr 29, 2026

CVE-2026-4970

CVE-2026-4970

Description

A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file delete_photos.php of the component Endpoint. The manipulation of the argument ID results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in delete_photos.php of code-projects Social Networking Site 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter.

Vulnerability

Details

The delete_photos.php endpoint in code-projects Social Networking Site v1.0 contains a SQL injection vulnerability. The application directly inserts the user-supplied id parameter from the HTTP request into a DELETE query without any sanitization, validation, or parameterization. This unsafe query construction (CWE-89) allows an attacker to inject arbitrary SQL code [1].

Exploitation

The attack can be performed remotely by sending a crafted HTTP GET request to the delete_photos.php file with a malicious id parameter. Testing has confirmed that the injection point supports time-based SQL injection, meaning the attacker can extract information by observing database response delays. No authentication is required to trigger the vulnerability [1].

Impact

Successful exploitation enables an attacker to execute arbitrary SQL commands on the backend database. This could lead to unauthorized access, theft, modification, or deletion of user data, including personal information and photos stored on the social networking platform [1].

Mitigation

As of the publication date, no patch has been released by the vendor. Users of code-projects Social Networking Site v1.0 should apply proper input validation and use parameterized queries (prepared statements) to prevent SQL injection. Given that the exploit has been published, the application is at high risk and should be updated or replaced [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.