VYPR
Medium severity6.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7114

CVE-2026-7114

Description

A vulnerability was determined in code-projects Employee Management System 1.0. This affects an unknown part of the file 370project/edit.php. This manipulation of the argument ID causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in code-projects Employee Management System 1.0 allows remote attackers to execute arbitrary SQL commands via the id parameter in edit.php.

Vulnerability

The Employee Management System version 1.0 by code-projects contains a SQL injection vulnerability in the /370project/edit.php script. The id parameter, received via a GET request, is directly concatenated into an SQL query without proper sanitization or parameterization, allowing an attacker to inject arbitrary SQL commands [1].

Exploitation

The vulnerability can be exploited remotely without authentication. An attacker only needs to send a crafted GET request to the vulnerable endpoint with a malicious payload in the id parameter. The provided proof of concept demonstrates a time-based blind injection using a sleep(10) command to confirm database execution [1].

Impact

Successful exploitation enables an attacker to extract sensitive data from the database, bypass query logic to access unauthorized records, and potentially degrade service availability through time-delay queries. The impact depends on the database user permissions, but at minimum, confidentiality and integrity can be compromised [1].

Mitigation

As of the publication date, no official patch has been released. The vendor's website (code-projects.org) hosts the source code, but the project appears unmaintained. The recommended mitigation is to replace direct parameter concatenation with prepared statements or parameterized queries in the edit.php file, and to perform input validation and least-privilege database access.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.