Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

583+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0
CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0
SECURITYHIGHCVE-2026-5637

CVE-2026-5637: SQL Injection in projectworlds Car Rental System 1.0

A remotely exploitable SQL injection vulnerability (CVE-2026-5637) has been disclosed in projectworlds Car Rental System 1.0. The flaw exists in message_admin.php via the Message parameter, allowing unauthenticated attackers to manipulate backend database queries with a CVSS score of 7.3.

Dylan H.

Security Team

April 7, 2026
4 min read

Affected Products

  • projectworlds Car Rental System 1.0 (message_admin.php)

Executive Summary

A SQL injection vulnerability (CVE-2026-5637) has been identified in projectworlds Car Rental System 1.0, a widely used open-source web application for vehicle rental management. The vulnerability resides in the /message_admin.php file within the Parameter Handler component. Manipulation of the Message argument allows an attacker to inject arbitrary SQL into the underlying database query.

The flaw is remotely exploitable over the network with no authentication required and has been assigned a CVSS v3.1 score of 7.3 (High).

CVSS Score: 7.3 (High) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-5637
CVSS Score7.3 (High)
TypeSQL Injection
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
Confidentiality / Integrity / AvailabilityLow / Low / Low
Published2026-04-06
SourceNVD / NIST

Affected Products

ProductVersionComponentStatus
projectworlds Car Rental System1.0message_admin.phpVulnerable

Technical Details

Vulnerability Description

The Parameter Handler in message_admin.php fails to properly sanitize user-supplied input before incorporating it into a SQL query. Specifically, the Message parameter is passed directly (or with insufficient filtering) into a database query, allowing an attacker to append SQL syntax that alters query logic.

Attack Mechanics

SQL injection vulnerabilities arise when user input is concatenated into a SQL query without parameterization or escaping. In this case:

POST /message_admin.php HTTP/1.1
Host: target.example.com
 
Message=Hello' OR '1'='1

A crafted payload in the Message parameter can cause the database engine to:

  • Bypass authentication logic built on query results
  • Enumerate database tables, columns, and data via UNION-based or error-based injection
  • Extract sensitive records including user credentials, booking data, and personal information
  • Write files to the server (if FILE privilege is granted to the database user)
  • Execute operating system commands via database-side features (e.g., MySQL xp_cmdshell equivalent or UDF abuse in certain configurations)

Exploitation Prerequisites

  • Network reachability to the web server hosting the Car Rental System
  • No authentication or account required
  • Standard HTTP client (browser, curl, SQLMap)

Impact Assessment

Impact AreaDescription
Data ExposureCustomer PII, booking records, payment data, and admin credentials may be extracted
Authentication BypassAdmin panels may be accessible without valid credentials
Database ManipulationAttackers can insert, update, or delete records
Potential RCEIn environments with elevated DB privileges, command execution may be achievable
Reputational HarmExposure of customer data creates liability under GDPR and similar regulations

Recommendations

Immediate Mitigations

  1. Apply parameterized queries / prepared statements — Replace all string-concatenated SQL in message_admin.php with parameterized queries using PDO or MySQLi prepared statements
  2. Input validation — Enforce server-side type and length validation on all user inputs before processing
  3. Least-privilege DB accounts — Ensure the application's database user has only SELECT, INSERT, UPDATE permissions; revoke FILE and SUPER if granted
  4. Web Application Firewall (WAF) — Deploy a WAF rule to detect and block SQLi patterns targeting message_admin.php
  5. Monitor database logs — Enable and review slow query logs and error logs for anomalous query patterns

Code-Level Fix (PHP Example)

Replace vulnerable concatenation:

// VULNERABLE — DO NOT USE
$query = "SELECT * FROM messages WHERE message = '" . $_POST['Message'] . "'";

With a parameterized prepared statement:

// SECURE
$stmt = $pdo->prepare("SELECT * FROM messages WHERE message = ?");
$stmt->execute([$_POST['Message']]);

Detection Indicators

IndicatorDescription
Unusual SQL keywords in HTTP POST bodiesUNION, SELECT, OR 1=1, -- in Message parameter
Repeated 500 errors from message_admin.phpError-based SQLi probing
Abnormally large response bodiesData exfiltration via UNION injection
SQLMap tool signatures in User-AgentAutomated exploitation attempts
Unexpected database user activityNon-application queries executed against the DB

References

  • NIST NVD — CVE-2026-5637
  • projectworlds Car Rental System on GitHub
  • OWASP SQL Injection Prevention Cheat Sheet
#Vulnerability#CVE#NVD#SQL Injection#Web Application

Related Articles

CVE-2026-5534 — SQL Injection in itsourcecode Online Enrollment System 1.0

A high-severity SQL injection vulnerability in itsourcecode Online Enrollment System 1.0 allows remote unauthenticated attackers to manipulate the USERID parameter to exfiltrate or corrupt database records.

4 min read

CVE-2026-5540 — SQL Injection in code-projects Simple Laundry System 1.0

A high-severity SQL injection vulnerability in code-projects Simple Laundry System 1.0 allows remote unauthenticated attackers to manipulate the firstName parameter in /modifymember.php to exfiltrate or corrupt database records.

4 min read

CVE-2019-25662: ResourceSpace 8.6 Unauthenticated SQL Injection

An unauthenticated SQL injection vulnerability in ResourceSpace 8.6 allows attackers to execute arbitrary database queries via the 'ref' parameter in watched_searches.php, potentially exposing usernames and credential hashes.

4 min read
Back to all Security Alerts