Submit #696667: SourceCodester AC Repair and Services System v1.0 SQL Injectioninfo

TitelSourceCodester AC Repair and Services System v1.0 SQL Injection
BeschreibungA SQL Injection vulnerability has been identified in the php-acrss application within the delete_inquiry function. The vulnerable code directly interpolates user-controlled input into an SQL query without proper validation or parameterization. This flaw allows an authenticated—and in some configurations unauthenticated—attacker to manipulate the underlying database. File: php-acrss/classes/Master.php Function: delete_inquiry Line: 154 The delete_inquiry function constructs an SQL query by concatenating the $id parameter directly into the statement: $del = $this->conn->query("DELETE FROM inquiry_list where id = '{$id}'"); Because the input is neither sanitized nor validated, a malicious user can inject arbitrary SQL payloads via the id parameter. This can lead to unauthorized deletion of database records or execution of additional SQL commands depending on the database permissions.
Quelle⚠️ https://github.com/regrews/cve-vulnerabilities/issues/1
Benutzer
 regrews (UID 92696)
Einreichung17.11.2025 14:22 (vor 5 Monaten)
Moderieren22.11.2025 17:55 (5 days later)
StatusDuplikat
VulDB Eintrag234223 [SourceCodester AC Repair and Services System 1.0 HTTP POST Request Master.php?f=delete_inquiry ID SQL Injection]
Punkte0

Do you know our Splunk app?

Download it now for free!