CVE-2026-3723: Php
CVE-2026-3723
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /Admindelete.php. The manipulation of the argument flightno r...
Overview
A high-severity security vulnerability has been identified in code-projects’ Simple Flight Ticket Booking System version 1.0. Tracked as CVE-2026-3723, this flaw is a SQL injection vulnerability in the /Admindelete.php file. Attackers can exploit this by manipulating the flightno argument, potentially allowing them to execute unauthorized database commands. Critically, this attack can be launched remotely over the network, and a public exploit is available, significantly increasing the risk of active attacks.
Vulnerability Explained
In simple terms, the system does not properly check or “sanitize” user input before using it in a database query. Specifically, when an administrator uses the delete flight function, the system takes the flight number (flightno) provided and includes it directly in a command sent to the database. An attacker can craft a malicious flight number containing extra database commands. Because the system trusts this input, it will execute those commands, giving the attacker unauthorized access to the database. This is a classic and dangerous form of SQL injection.
Potential Impact
The impact of this vulnerability is severe. A successful attacker could:
- Steal Sensitive Data: Extract all data from the database, including customer personally identifiable information (PII), payment details, and administrator credentials. For context on the risks of such data exposure, recent incidents are detailed in our breach reports.
- Modify or Delete Data: Alter flight records, delete bookings, or corrupt the entire database, causing significant operational disruption.
- Gain Administrative Control: Potentially compromise administrator accounts to take full control of the application.
With the exploit publicly available, unpatched systems are at immediate and high risk of compromise.
Remediation and Mitigation
Primary Action: Update or Replace. As this affects version 1.0 of a project that may not have official vendor patches, the strongest course of action is to upgrade to a newer, supported version if available. If no official patch exists, consider migrating to a different, actively maintained booking platform.
Immediate Mitigation (If Update is Not Possible):
- Input Validation & Prepared Statements: The root cause must be fixed in the code. Modify
/Admindelete.phpto use parameterized queries (prepared statements) for all database interactions involving theflightnoparameter. This is the only definitive way to prevent SQL injection. - Network Restriction: Immediately restrict access to the admin interface (and the
/Admindelete.phpfile specifically) by IP address, allowing only trusted administrative networks. - Web Application Firewall (WAF): Deploy or configure a WAF to block SQL injection patterns. This is a temporary filter, not a code fix, but can help block known attack signatures.
- Audit and Monitor: Review database and application logs for any suspicious activity around the
Admindelete.phpendpoint. Assume your system may have already been targeted and check for signs of a breach.
Stay informed on emerging threats by following the latest security news. Organizations using this software must act immediately to prevent data loss and system compromise.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability was found in code-projects Simple Flight Ticket Booking System 1.0. This issue affects some unknown processing of the file /Adminsearch.php. The manipulation of the argument flightno r...
A security flaw has been discovered in code-projects Simple Flight Ticket Booking System 1.0. The impacted element is an unknown function of the file /login.php. Performing a manipulation of the argum...
A weakness has been identified in code-projects Simple Flight Ticket Booking System 1.0. This affects an unknown function of the file /register.php. Executing a manipulation of the argument Username c...
A security flaw has been discovered in itsourcecode Free Hotel Reservation System 1.0. The affected element is an unknown function of the file /hotel/admin/mod_amenities/index.php?view=edit. Performin...
Other PHP Vulnerabilities
Jettweb PHP Hazir Rent A Car Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the arac_kateg...
Jettweb Php Hazir Ilan Sitesi Scripti V2 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'kat' parameter....
Jettweb PHP Hazir Haber Sitesi Scripti V2 contains an authentication bypass vulnerability in the administration panel that allows unauthenticated attackers to gain administrative access by exploiting ...
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the videoid paramet...