High (7.3)

CVE-2026-6151: Vehicle Showroom Management System SQLi - PoC Available

CVE-2026-6151

A vulnerability was found in code-projects Vehicle Showroom Management System 1.0. This vulnerability affects unknown code of the file /util/PaymentStatusFunction.php. The manipulation of the argument...

Overview

A high-severity SQL injection vulnerability, identified as CVE-2026-6151, exists in code-projects’ Vehicle Showroom Management System version 1.0. The flaw resides in the /util/PaymentStatusFunction.php file and allows remote attackers to manipulate the CUSTOMER_ID parameter to execute arbitrary SQL commands on the underlying database. A proof-of-concept (PoC) exploit for this vulnerability has been made publicly available.

Technical Details

The vulnerability stems from improper neutralization of special elements within the CUSTOMER_ID argument before it is used in an SQL query. With an Attack Vector of NETWORK and no required privileges or user interaction (CVSS: 7.3), an unauthenticated attacker can remotely send specially crafted requests to the vulnerable endpoint. This can lead to data theft, data manipulation, or a complete compromise of the database server.

Impact

Successful exploitation of this SQL injection could allow an attacker to access, modify, or delete sensitive information stored in the application’s database. This includes customer records, payment details, and vehicle inventory data. In severe cases, it could enable full control of the database, leading to significant data breaches and operational disruption for businesses using this software. For context on the real-world impact of such data exposures, recent incidents are detailed in our breach reports.

Remediation and Mitigation

As of this advisory, the vendor has not released an official patch. Users of Vehicle Showroom Management System 1.0 should immediately take the following actions:

  1. Isolate and Monitor: If the system must remain online, ensure it is placed behind a web application firewall (WAF) configured with SQL injection rules and monitor logs for suspicious activity targeting the /util/PaymentStatusFunction.php file.
  2. Apply Input Validation: If source code access is available, implement strict input validation and parameterized queries for the CUSTOMER_ID parameter.
  3. Consider Alternatives: Given the public availability of an exploit and the lack of a vendor fix, the most secure course of action is to discontinue use of this software and migrate to a supported alternative.

Stay informed on emerging threats and patches by following our security news.

Security Insight

This vulnerability highlights the persistent risk in niche, third-party web applications often deployed in business environments without rigorous security review. The public release of a PoC exploit before a vendor patch is available creates a dangerous window of exposure, mirroring patterns seen in widespread compromises of other small-business software. It underscores the necessity for organizations to maintain an inventory of all software assets, especially lesser-known applications, and have contingency plans for when vendors are unresponsive.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.