VYPR
Medium severity5.3NVD Advisory· Published Apr 27, 2026· Updated Apr 27, 2026

CVE-2026-7132

CVE-2026-7132

Description

A vulnerability was found in code-projects Online Lot Reservation System up to 1.0. This affects the function readfile of the file /download.php. The manipulation of the argument File results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated path traversal in /download.php allows remote attackers to read arbitrary server files in code-projects Online Lot Reservation System up to 1.0.

Vulnerability

Analysis

An arbitrary file reading vulnerability exists in the download.php file of code-projects Online Lot Reservation System version 1.0. The root cause is that the File parameter supplied by the user is not filtered or validated before being passed directly to the PHP readfile() function [1]. This lack of sanitization enables path traversal and/or absolute file path usage.

Attack

Vector

The attack is remotely exploitable without any authentication or authorization [1]. An attacker can send a crafted HTTP GET request to /download.php with a file parameter containing path traversal sequences (e.g., ../) or an absolute path to a sensitive file. Proof-of-concept requests demonstrate reading Windows system files, the hosts file, and application source code [1].

Impact

Successful exploitation allows an attacker to read any file on the server, including database configuration files (potentially leaking credentials), sensitive system files such as /etc/passwd or C:\Windows\win.ini, and application source code [1]. This compromises confidentiality of the server and connected systems.

Mitigation

No official patch has been released by the vendor (code-projects) as of the publication date [2]. Suggested fixes include implementing a whitelist of allowed directories and using basename() to prevent directory traversal attacks [1]. Users should apply input validation and restrict file access through server configuration until a permanent fix is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.