VYPR
Medium severity6.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7118

CVE-2026-7118

Description

A security vulnerability has been detected in code-projects Employee Management System 1.0. The affected element is an unknown function of the file 370project/cancel.php. The manipulation of the argument id/token leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in code-projects Employee Management System 1.0 cancel.php allows remote attackers to manipulate leave requests or infer database data via time-based blind techniques.

Vulnerability

Analysis

An undocumented SQL injection vulnerability exists in the cancel.php file of the code-projects Employee Management System 1.0. The id and token GET parameters are directly concatenated into an SQL UPDATE statement without any sanitization or parameterization [1]. This allows an attacker to inject arbitrary SQL commands by manipulating either parameter [1].

Exploitation

The attack is remotely exploitable without authentication, as the vulnerable endpoint /cancel.php accepts GET requests and uses the user-supplied id and token values directly in a query: UPDATE employee_leave SET status='Cancelled' WHERE id=$id and token = $token [1]. A proof of concept demonstrates a time-based blind SQL injection payload that causes a 10-second delay via SLEEP(10), confirming the vulnerability [1]. An attacker with knowledge of the application's database structure could use this to infer data or modify records.

Impact

Successful exploitation could allow an attacker to manipulate leave-request statuses (e.g., unauthorized cancellation), infer sensitive database information through blind SQL injection techniques, or degrade availability by triggering expensive database operations [1]. The direct impact depends on the database user's permissions, but the unauthenticated remote access vector increases the risk.

Mitigation

As of the publication date, no official patch has been released for this vulnerability in version 1.0. The vendor, code-projects, has been notified via the public disclosure. Users should apply input validation and parameterized queries to the cancel.php script as a workaround until an update is provided [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.