SQLi Found in Lost and Found Thing Management
A high-severity SQL injection vulnerability, tracked as CVE-2026-6163, has been identified in version 1.0 of code-projects Lost and Found Thing Management. According to the National Vulnerability Database, this flaw resides within an unspecified function of the /catageory.php file. Manipulating the cat argument can lead directly to SQL injection.
This isn’t just a theoretical bug; the National Vulnerability Database reports that a public exploit is already available, meaning it’s only a matter of time before this gets weaponized in the wild. With a CVSS score of 7.3 (HIGH) and a vector indicating remote exploitability without authentication, this is a prime target for opportunistic attackers. It’s a classic case of CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) combined with CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component), underscoring fundamental input validation failures.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6163
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6163 | Vulnerability | CVE-2026-6163 |