VYPR
Medium severity6.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7115

CVE-2026-7115

Description

A vulnerability was identified in code-projects Employee Management System 1.0. This vulnerability affects unknown code of the file 370project/delete.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Employee Management System 1.0 delete.php has a time-based blind SQL injection in the id parameter, allowing remote attackers to manipulate or delete database records.

Vulnerability

Analysis

The vulnerability resides in the delete.php file of code-projects Employee Management System 1.0. The id parameter from the GET request is directly concatenated into a DELETE SQL statement without any sanitization or parameterization: $result = mysqli_query($conn, "DELETE FROM employee WHERE id=$id") [1]. This allows an attacker to inject arbitrary SQL commands through the id parameter.

Exploitation

An attacker can exploit this by sending a crafted GET request to /delete.php?id=<payload>. The provided proof-of-concept uses a time-based blind technique with a sleep(10) payload to confirm database-side execution [1]. The attack is remotely exploitable without authentication, as the endpoint is publicly accessible. The exploit has been publicly disclosed, increasing the risk of active exploitation.

Impact

Successful exploitation could allow an attacker to manipulate or delete arbitrary records from the database, depending on database permissions. Using blind SQL injection techniques, an attacker can infer database structure and contents. Additionally, time-delay payloads can degrade application availability by forcing expensive database operations [1].

Mitigation

As of the publication date, no official patch has been released. The vendor (code-projects) has not issued an update. The recommended mitigation is to use parameterized queries (prepared statements) to prevent SQL injection. Until a fix is applied, administrators should restrict access to the delete.php endpoint or implement a web application firewall (WAF) to block malicious payloads.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.