SQLi Found in Vehicle Showroom Management System
The National Vulnerability Database (NVD) has flagged CVE-2026-6153, a high-severity SQL injection vulnerability impacting version 1.0 of the code-projects Vehicle Showroom Management System. This isn’t just a theoretical flaw; NVD reports that the exploit is publicly available, meaning script kiddies and seasoned attackers alike could be leveraging this right now.
The vulnerability resides within an undisclosed function in the /util/StaffDetailsFunction.php file. Malicious manipulation of the STAFF_ID argument allows for remote SQL injection, giving an attacker the keys to the database. With a CVSS score of 7.3 (HIGH), this isn’t something to brush off. It’s a classic case of CWE-74 (Improper Neutralization of Special Elements in an SQL Command) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)), highlighting fundamental input validation failures.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6153
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6153 | SQLi | code-projects Vehicle Showroom Management System 1.0 |
| CVE-2026-6153 | SQLi | Vulnerable file: /util/StaffDetailsFunction.php |
| CVE-2026-6153 | SQLi | Vulnerable argument: STAFF_ID |