A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file /delete_post.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
PUBLISHED5.2CWE-89CWE-74x_freeware
code-projects Social Networking Site delete_post.php sql injection
Problem type
Affected products
code-projects
Social Networking Site
1.0 - AFFECTED
References
VDB-344650 | code-projects Social Networking Site delete_post.php sql injection
https://vuldb.com/?id.344650
VDB-344650 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.344650
Submit #745937 | code-projects Social Networking Site V1.0 SQL Injection
https://vuldb.com/?submit.745937
github.com
https://github.com/6Justdododo6/CVE/issues/1
code-projects.org
https://code-projects.org/
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-2083Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2083",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-07T10:32:06.454Z",
"dateReserved": "2026-02-06T08:10:18.338Z",
"datePublished": "2026-02-07T10:32:06.454Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-07T10:32:06.454Z"
},
"title": "code-projects Social Networking Site delete_post.php sql injection",
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in code-projects Social Networking Site 1.0. This affects an unknown function of the file /delete_post.php. Performing a manipulation of the argument ID results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks."
}
],
"affected": [
{
"vendor": "code-projects",
"product": "Social Networking Site",
"versions": [
{
"version": "1.0",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "SQL Injection",
"cweId": "CWE-89",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344650",
"name": "VDB-344650 | code-projects Social Networking Site delete_post.php sql injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.344650",
"name": "VDB-344650 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.745937",
"name": "Submit #745937 | code-projects Social Networking Site V1.0 SQL Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/6Justdododo6/CVE/issues/1",
"tags": [
"exploit",
"issue-tracking"
]
},
{
"url": "https://code-projects.org/",
"tags": [
"product"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 7.3,
"baseSeverity": "HIGH"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 7.5
}
}
],
"timeline": [
{
"time": "2026-02-06T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-06T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-06T09:15:21.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "XuYue (VulDB User)",
"type": "reporter"
}
],
"tags": [
"x_freeware"
]
}
}
}