VYPR
Medium severity6.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7117

CVE-2026-7117

Description

A weakness has been identified in code-projects Employee Management System 1.0. Impacted is an unknown function of the file 370project/approve.php. Executing a manipulation of the argument id/token can lead to sql injection. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in Employee Management System 1.0 via id and token parameters in approve.php allows remote attackers to manipulate database operations.

Root

Cause

The vulnerability resides in the approve.php file of the Employee Management System 1.0. The application directly concatenates user-supplied id and token parameters into an SQL UPDATE statement without parameterization or sanitization [1]. This allows an attacker to inject arbitrary SQL commands.

Exploitation

An unauthenticated remote attacker can exploit this by sending a crafted GET request to /approve.php?id=...&token=.... The proof-of-concept demonstrates a time-based blind SQL injection using a payload like (select*from(select+sleep(5)union/**/select+1)a) to cause a measurable delay in the response [1]. No authentication is required, and the attack can be executed over the network.

Impact

Successful exploitation enables an attacker to manipulate the approval logic (e.g., unauthorized status changes), infer database structure or data through blind techniques, and degrade performance by triggering expensive database operations [1]. The impact is limited by the database user's permissions, but the vulnerability is publicly known and exploit code is available.

Mitigation

As of the publication date, no official patch has been released. The vendor (code-projects.org) provides the source code, and users are advised to implement parameterized queries (prepared statements) to prevent SQL injection. Until a fix is applied, the application remains at risk.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.