SQLi Exploit Drops for Simple CMS 1.0
The National Vulnerability Database (NVD) has flagged a critical SQL injection vulnerability, CVE-2026-6183, affecting code-projects Simple Content Management System (CMS) version 1.0. This isn’t some theoretical flaw; NVD reports that the exploit is already public, making it a prime target for opportunistic attackers.
The vulnerability resides within an unspecified function tied to the /web/index.php file. By manipulating the ID argument, an attacker can trigger SQL injection, potentially leading to unauthorized data access, modification, or even full database compromise. With a CVSS score of 7.3 (High) and remote exploitation possible, this is a glaring hole. The fact that an exploit is already out there means organizations running this CMS need to act yesterday, not tomorrow. This isn’t just about data; it’s about the integrity of your entire web presence.
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6183
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6183 | SQLi | code-projects Simple Content Management System 1.0 |
| CVE-2026-6183 | SQLi | Vulnerable file: /web/index.php |
| CVE-2026-6183 | SQLi | Vulnerable argument: ID |