CVE-2026-0591
MEDIUMFabian Online Product Reservation System - Injection
Title source: ruleDescription
A vulnerability was identified in code-projects Online Product Reservation System 1.0. The impacted element is an unknown function of the file /app/checkout/update.php of the component Cart Update Handler. Such manipulation of the argument id/qty leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
technical-description
https://vuldb.com/?id.339501
Permissions Required, VDB Entry signature
permissions-required
https://vuldb.com/?ctiid.339501
Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.731129
Exploit, Third Party Advisory patch
https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_update.php.md
Exploit, Third Party Advisory exploit
patch
https://github.com/foeCat/CVE/blob/main/OnlineProductReservation_PHP/sqli_checkout_update.php.md#poc
Product product
https://code-projects.org/
Scores
CVSS v3
6.3
EPSS
0.0007
EPSS Percentile
20.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-89
Status
published
Products (1)
fabian/online_product_reservation_system
1.0
Published
Jan 05, 2026
Tracked Since
Feb 18, 2026