CVE-2026-7115
Description
A vulnerability was identified in code-projects Employee Management System 1.0. This vulnerability affects unknown code of the file 370project/delete.php. Such manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit is publicly available and might be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Employee Management System 1.0 delete.php has a time-based blind SQL injection in the id parameter, allowing remote attackers to manipulate or delete database records.
Vulnerability
Analysis
The vulnerability resides in the delete.php file of code-projects Employee Management System 1.0. The id parameter from the GET request is directly concatenated into a DELETE SQL statement without any sanitization or parameterization: $result = mysqli_query($conn, "DELETE FROM employee WHERE id=$id") [1]. This allows an attacker to inject arbitrary SQL commands through the id parameter.
Exploitation
An attacker can exploit this by sending a crafted GET request to /delete.php?id=<payload>. The provided proof-of-concept uses a time-based blind technique with a sleep(10) payload to confirm database-side execution [1]. The attack is remotely exploitable without authentication, as the endpoint is publicly accessible. The exploit has been publicly disclosed, increasing the risk of active exploitation.
Impact
Successful exploitation could allow an attacker to manipulate or delete arbitrary records from the database, depending on database permissions. Using blind SQL injection techniques, an attacker can infer database structure and contents. Additionally, time-delay payloads can degrade application availability by forcing expensive database operations [1].
Mitigation
As of the publication date, no official patch has been released. The vendor (code-projects) has not issued an update. The recommended mitigation is to use parameterized queries (prepared statements) to prevent SQL injection. Until a fix is applied, administrators should restrict access to the delete.php endpoint or implement a web application firewall (WAF) to block malicious payloads.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: =1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.