Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

569+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-5575: SQL Injection in SourceCodester Record Management System Login
CVE-2026-5575: SQL Injection in SourceCodester Record Management System Login
SECURITYHIGHCVE-2026-5575

CVE-2026-5575: SQL Injection in SourceCodester Record Management System Login

A remotely exploitable SQL injection vulnerability has been disclosed in SourceCodester/jkev Record Management System 1.0, affecting the Login page's Username parameter and allowing unauthenticated attackers to manipulate backend queries.

Dylan H.

Security Team

April 6, 2026
5 min read

Affected Products

  • SourceCodester Record Management System 1.0

CVE-2026-5575: SQL Injection in Record Management System Login Page

A SQL injection vulnerability tracked as CVE-2026-5575 has been disclosed in SourceCodester/jkev Record Management System 1.0, a PHP-based record-keeping web application. The flaw resides in the Login component at index.php and is exploitable remotely without any authentication, making it a critical risk for any internet-accessible deployment.

The vulnerability was assigned a CVSS v3.1 score of 7.3 (High) and classified under CWE-89 — Improper Neutralization of Special Elements used in SQL Commands.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-5575
CVSS Score7.3 (High)
CWE ClassificationCWE-89 — SQL Injection
Affected SoftwareSourceCodester Record Management System 1.0
Vulnerable Fileindex.php
Vulnerable ComponentLogin form — Username field
Attack VectorNetwork (Remote)
Authentication RequiredNone
Exploit PublishedYes — public exploit available
Patch AvailableNone confirmed

Technical Details

Affected Component

The vulnerability exists in the Login page of the Record Management System. The index.php file processes the Username parameter submitted via the login form and passes the value directly into a SQL query without adequate sanitization or parameterized query handling.

Exploitation Mechanism

An unauthenticated attacker can submit a crafted value in the Username form field to inject arbitrary SQL code:

Username: admin' OR '1'='1
Username: ' UNION SELECT NULL, NULL, table_name FROM information_schema.tables--

Depending on the database configuration, successful exploitation could allow:

  • Authentication bypass — logging in as any user, including the administrator, without a valid password
  • Database enumeration — extracting table names, column definitions, and row data from all accessible tables
  • Credential harvesting — recovering stored usernames and password hashes from the user table
  • Data manipulation — inserting, modifying, or deleting records via stacked queries or writable injection points

Attack Flow

1. Attacker identifies an internet-accessible Record Management System login page

2. Attacker submits crafted SQL payload in the Username login field

3. Unsanitized input is concatenated into a backend SQL query

4. The database executes the injected SQL logic

5. Attacker achieves authentication bypass or data extraction

6. With admin access, attacker reads, modifies, or deletes managed records

Affected Software Context

SourceCodester is a widely referenced repository distributing open-source PHP web application source code, primarily targeting students and academic projects. The Record Management System 1.0 is distributed as a free download for learning PHP-based CRUD applications.

Despite the educational context, SourceCodester applications are frequently deployed in production or semi-production environments by small organizations, government agencies in developing regions, and academic institutions — without security hardening. This pattern has produced a consistent stream of disclosed CVEs across SourceCodester codebases in recent months, all pointing to a systemic absence of input validation and parameterized query usage throughout their PHP code.


Remediation

Immediate Steps

No official patch has been released. Deployments of this software should apply the following mitigations immediately:

  1. Restrict access — Block the application from public internet access; enforce access through VPN or IP allowlisting
  2. Deploy a Web Application Firewall — Rules detecting SQL injection patterns will block exploitation attempts against this and similar endpoints
  3. Parameterize all queries — Replace direct string interpolation with PDO prepared statements or MySQLi parameterized queries
  4. Audit credentials — If the system has been internet-accessible, treat all stored credentials as potentially compromised
  5. Review access logs — Inspect server logs for malformed login attempts, large payloads, or SQL keywords in form submissions

Code-Level Fix

The root cause is direct interpolation of user input into SQL queries:

// Vulnerable pattern
$query = "SELECT * FROM users WHERE username = '" . $_POST['username'] . "'";
 
// Secure pattern (PDO prepared statement)
$stmt = $pdo->prepare("SELECT * FROM users WHERE username = ?");
$stmt->execute([$_POST['username']]);

Impact Assessment

Impact AreaDescription
Authentication BypassAdmin and user accounts accessible without valid credentials
Data ExposureFull database contents extractable via UNION-based injection
Credential TheftStored passwords and session tokens can be harvested
Record TamperingManaged records can be modified or deleted
Deployment RiskPublic exploit available; risk depends entirely on internet accessibility

Key Takeaways

  1. CVE-2026-5575 is a CVSS 7.3 SQL injection in SourceCodester Record Management System 1.0 affecting the login page's Username parameter
  2. The flaw requires no authentication and is exploitable directly from the internet
  3. A public exploit has been released, raising the urgency for any production deployment
  4. No official patch exists — access restriction and WAF deployment are the primary mitigations
  5. This vulnerability continues a well-documented pattern of SQL injection flaws across SourceCodester PHP applications — all should be treated as untrusted for production use without thorough security review

Sources

  • CVE-2026-5575 — NIST NVD
#CVE-2026-5575#SQL Injection#SourceCodester#PHP#CWE-89#Vulnerability#Web Security

Related Articles

CVE-2026-5554: SQL Injection in Concert Ticket Reservation System Search

A remotely exploitable SQL injection vulnerability has been disclosed in code-projects Concert Ticket Reservation System 1.0, affecting the process_search.php file via the unsanitized searchi parameter. CVSS 7.3.

5 min read

CVE-2026-5555: SQL Injection in Concert Ticket Reservation System Login

An unauthenticated SQL injection vulnerability has been disclosed in code-projects Concert Ticket Reservation System 1.0, affecting the login.php file via the Email parameter — enabling authentication bypass and full database access. CVSS 7.3.

5 min read

CVE-2026-5551: SQL Injection in itsourcecode Free Hotel Reservation System Login

A remotely exploitable SQL injection vulnerability has been disclosed in itsourcecode Free Hotel Reservation System 1.0, affecting the login page's email parameter and allowing unauthenticated attackers to manipulate backend SQL queries from the network.

5 min read
Back to all Security Alerts