SQLi Flaw Hits Vehicle Showroom Management System
A high-severity SQL injection vulnerability, identified as CVE-2026-6166, has been reported in code-projects Vehicle Showroom Management System 1.0. According to the National Vulnerability Database, this flaw impacts an unspecified processing function within the /util/UpdateVehicleFunction.php file.
The vulnerability is triggered by manipulating the VEHICLE_ID argument, allowing for remote SQL injection. This means an attacker doesn’t need physical access or even to be on the same network to exploit it. With a CVSS score of 7.3, this issue carries significant risk, primarily due to its remote exploitability and the fact that public exploit details are already available, making it a prime target for opportunistic attackers. This is a classic case of CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) and CWE-74 (Improper Neutralization of Special Elements in Output Used by a Different Context), highlighting a fundamental input validation failure.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6166
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6166 | SQLi | code-projects Vehicle Showroom Management System 1.0 |
| CVE-2026-6166 | SQLi | Vulnerable file: /util/UpdateVehicleFunction.php |
| CVE-2026-6166 | SQLi | Vulnerable parameter: VEHICLE_ID |