SQL Injection Found in Simple CMS: Public Exploit Available
A high-severity SQL injection vulnerability, tracked as CVE-2026-6182, has been identified in code-projects Simple Content Management System version 1.0. According to the National Vulnerability Database, this flaw resides within an unspecified function of the /web/admin/login.php file.
The vulnerability is triggered by manipulating the User argument, allowing remote attackers to execute SQL injection attacks. The CVSSv3.1 score of 7.3 (HIGH) underscores the risk, with an AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L vector indicating it’s network-exploitable with low complexity, requiring no privileges or user interaction, and impacting confidentiality, integrity, and availability.
What’s concerning is that a public exploit is already available. This significantly lowers the bar for attackers, making it easier for even script kiddies to leverage the flaw. The CWEs associated with this vulnerability are CWE-74 (Improper Neutralization of Special Elements in Output Used by a Different Context) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command (‘SQL Injection’)), which are classic web application security pitfalls.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6182
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6182 | SQLi | code-projects Simple Content Management System version 1.0 |
| CVE-2026-6182 | SQLi | Vulnerable file: /web/admin/login.php |
| CVE-2026-6182 | SQLi | Vulnerable argument: User |