CVE-2026-8098: SQL Injection in code-projects Feedback System 1.0
The National Vulnerability Database has disclosed CVE-2026-8098, a high-severity SQL injection vulnerability impacting code-projects Feedback System 1.0. Specifically, an unknown function within the /admin/checklogin.php file is susceptible to manipulation via the email argument, leading to arbitrary SQL execution.
This vulnerability carries a CVSSv3.1 score of 7.3 (High), indicating a significant risk. Crucially, it’s remotely exploitable, requiring no authentication, and a public exploit has already been disclosed. This means attackers don’t need to be on the local network and proof-of-concept code is likely readily available, accelerating exploitation.
For defenders, this is a critical remote code execution vector if the application is internet-facing. SQL injection can lead to full database compromise, data exfiltration, and potentially even system-level access. Given the public exploit, patching or mitigation should be a top priority for any organization running this specific feedback system.
What This Means For You
- If your organization uses code-projects Feedback System 1.0, you are directly exposed to CVE-2026-8098. Immediately identify all instances of this system and prioritize patching or isolating them. Assume compromise if you cannot confirm a patch, and audit logs for unusual database activity or unauthorized access attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-8098: SQL Injection in code-projects Feedback System checklogin.php
title: CVE-2026-8098: SQL Injection in code-projects Feedback System checklogin.php
id: scw-2026-05-07-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-8098 by targeting the /admin/checklogin.php script with SQL injection payloads. The rule specifically looks for the 'email' parameter in the query string and common SQL injection keywords and syntax patterns that indicate an attempt to manipulate the database.
author: SCW Feed Engine (AI-generated)
date: 2026-05-07
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-8098/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/admin/checklogin.php'
cs-uri-query|contains:
- 'email='
cs-uri-query|contains:
- ' OR '
cs-uri-query|contains:
- ' = '
cs-uri-query|contains:
- ' UNION '
cs-uri-query|contains:
- ' SELECT '
cs-uri-query|contains:
- ' FROM '
cs-uri-query|contains:
- ' --'
cs-uri-query|contains:
- ' #'
condition: cs-uri AND cs-uri-query
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-8098 | SQLi | code-projects Feedback System 1.0 |
| CVE-2026-8098 | SQLi | Vulnerable file: /admin/checklogin.php |
| CVE-2026-8098 | SQLi | Vulnerable argument: email |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 08, 2026 at 00:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.