CVE-2026-7118
Description
A security vulnerability has been detected in code-projects Employee Management System 1.0. The affected element is an unknown function of the file 370project/cancel.php. The manipulation of the argument id/token leads to sql injection. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in code-projects Employee Management System 1.0 cancel.php allows remote attackers to manipulate leave requests or infer database data via time-based blind techniques.
Vulnerability
Analysis
An undocumented SQL injection vulnerability exists in the cancel.php file of the code-projects Employee Management System 1.0. The id and token GET parameters are directly concatenated into an SQL UPDATE statement without any sanitization or parameterization [1]. This allows an attacker to inject arbitrary SQL commands by manipulating either parameter [1].
Exploitation
The attack is remotely exploitable without authentication, as the vulnerable endpoint /cancel.php accepts GET requests and uses the user-supplied id and token values directly in a query: UPDATE employee_leave SET status='Cancelled' WHERE id=$id and token = $token [1]. A proof of concept demonstrates a time-based blind SQL injection payload that causes a 10-second delay via SLEEP(10), confirming the vulnerability [1]. An attacker with knowledge of the application's database structure could use this to infer data or modify records.
Impact
Successful exploitation could allow an attacker to manipulate leave-request statuses (e.g., unauthorized cancellation), infer sensitive database information through blind SQL injection techniques, or degrade availability by triggering expensive database operations [1]. The direct impact depends on the database user's permissions, but the unauthenticated remote access vector increases the risk.
Mitigation
As of the publication date, no official patch has been released for this vulnerability in version 1.0. The vendor, code-projects, has been notified via the public disclosure. Users should apply input validation and parameterized queries to the cancel.php script as a workaround until an update is provided [1][2].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.