SQLi Flaw Hits Faculty Management System: Exploit Public
A critical SQL injection vulnerability, identified as CVE-2026-6167, has been reported in code-projects Faculty Management System 1.0. According to the National Vulnerability Database, this flaw exists within an unspecified function of the /subject-print.php file.
The vulnerability is triggered through the manipulation of the ID argument, allowing for remote SQL injection. This is a significant concern, especially given that a public exploit is now available. The National Vulnerability Database has assigned a CVSS score of 7.3 (HIGH) to this vulnerability, underscoring its potential for serious impact. The associated CWEs, CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)), highlight the classic nature of this database compromise vector.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6167
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6167 | SQLi | code-projects Faculty Management System 1.0 |
| CVE-2026-6167 | SQLi | Vulnerable file: /subject-print.php |
| CVE-2026-6167 | SQLi | Vulnerable argument: ID |