CVE-2026-6151: Vehicle Showroom Management System SQLi - PoC Available
CVE-2026-6151
A vulnerability was found in code-projects Vehicle Showroom Management System 1.0. This vulnerability affects unknown code of the file /util/PaymentStatusFunction.php. The manipulation of the argument...
Overview
A high-severity SQL injection vulnerability, identified as CVE-2026-6151, exists in code-projects’ Vehicle Showroom Management System version 1.0. The flaw resides in the /util/PaymentStatusFunction.php file and allows remote attackers to manipulate the CUSTOMER_ID parameter to execute arbitrary SQL commands on the underlying database. A proof-of-concept (PoC) exploit for this vulnerability has been made publicly available.
Technical Details
The vulnerability stems from improper neutralization of special elements within the CUSTOMER_ID argument before it is used in an SQL query. With an Attack Vector of NETWORK and no required privileges or user interaction (CVSS: 7.3), an unauthenticated attacker can remotely send specially crafted requests to the vulnerable endpoint. This can lead to data theft, data manipulation, or a complete compromise of the database server.
Impact
Successful exploitation of this SQL injection could allow an attacker to access, modify, or delete sensitive information stored in the application’s database. This includes customer records, payment details, and vehicle inventory data. In severe cases, it could enable full control of the database, leading to significant data breaches and operational disruption for businesses using this software. For context on the real-world impact of such data exposures, recent incidents are detailed in our breach reports.
Remediation and Mitigation
As of this advisory, the vendor has not released an official patch. Users of Vehicle Showroom Management System 1.0 should immediately take the following actions:
- Isolate and Monitor: If the system must remain online, ensure it is placed behind a web application firewall (WAF) configured with SQL injection rules and monitor logs for suspicious activity targeting the
/util/PaymentStatusFunction.phpfile. - Apply Input Validation: If source code access is available, implement strict input validation and parameterized queries for the
CUSTOMER_IDparameter. - Consider Alternatives: Given the public availability of an exploit and the lack of a vendor fix, the most secure course of action is to discontinue use of this software and migrate to a supported alternative.
Stay informed on emerging threats and patches by following our security news.
Security Insight
This vulnerability highlights the persistent risk in niche, third-party web applications often deployed in business environments without rigorous security review. The public release of a PoC exploit before a vendor patch is available creates a dangerous window of exposure, mirroring patterns seen in widespread compromises of other small-business software. It underscores the necessity for organizations to maintain an inventory of all software assets, especially lesser-known applications, and have contingency plans for when vendors are unresponsive.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
A vulnerability was identified in tushar-2223 Hotel Management System up to bb1f3b3666124b888f1e4bcf51b6fba9fbb01d15. Affected by this vulnerability is an unknown functionality of the file /admin/room...
A vulnerability was detected in code-projects Vehicle Showroom Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /util/MonthTotalReportUpdateFunction.php. P...
A flaw has been found in code-projects Vehicle Showroom Management System 1.0. Affected by this issue is some unknown functionality of the file /util/BookVehicleFunction.php. Executing a manipulation ...
A vulnerability was determined in code-projects Vehicle Showroom Management System 1.0. This issue affects some unknown processing of the file /util/StaffAddingFunction.php. This manipulation of the a...