Platform
php
Component
code-projects-online-fir-system
Fixed in
1.0.1
CVE-2026-5665 describes a SQL Injection vulnerability discovered in the Online FIR System, specifically within the Login component's /Login/checklogin.php file. This flaw allows attackers to manipulate the email and password parameters, potentially leading to unauthorized access and data manipulation within the system's database. The vulnerability affects versions 1.0.0 through 1.0, and a fix is pending; mitigation strategies are outlined below.
Successful exploitation of CVE-2026-5665 could grant an attacker complete control over the Online FIR System's database. This includes the ability to read, modify, or delete sensitive user data, including personally identifiable information (PII) collected through the FIR system. An attacker could also potentially use this vulnerability to gain a foothold within the broader network if the database server has access to other internal resources. The SQL injection attack is remotely exploitable, meaning an attacker does not need to be on the same network as the Online FIR System to exploit it. The public disclosure of this vulnerability significantly increases the risk of exploitation.
CVE-2026-5665 has been publicly disclosed, increasing the likelihood of exploitation. The vulnerability is considered HIGH severity due to the potential for significant data compromise and system takeover. No specific KEV listing or EPSS score is currently available. The public availability of the vulnerability details and potential exploit techniques makes it a high priority for remediation.
Exploit Status
EPSS
0.04% (12% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5665 is to upgrade to a patched version of the Online FIR System once available. Until a patch is released, several temporary mitigations can be implemented. First, implement a Web Application Firewall (WAF) rule to filter out malicious SQL injection attempts targeting the /Login/checklogin.php endpoint. Second, enforce strict input validation on the email and password parameters, ensuring they conform to expected formats and lengths. Third, review and harden the database server's configuration to limit access and reduce the potential impact of a successful attack. After implementing these mitigations, verify their effectiveness by attempting to reproduce the vulnerability with a safe test payload.
Update the system to a patched version or apply security patches to mitigate the (SQL Injection) vulnerability in the /Login/checklogin.php file. Implement input validation and sanitization to prevent the injection of malicious code. Consider using prepared statements or stored procedures to interact with the database securely.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5665 is a SQL Injection vulnerability affecting versions 1.0.0–1.0 of the Online FIR System, allowing attackers to manipulate database queries through the /Login/checklogin.php file.
If you are using Online FIR System versions 1.0.0–1.0, you are potentially affected by this vulnerability. Assess your environment and implement mitigations immediately.
The recommended fix is to upgrade to a patched version of the Online FIR System. Until a patch is available, implement WAF rules and input validation as temporary mitigations.
Due to the public disclosure of this vulnerability, it is likely being actively targeted by attackers. Prompt remediation is crucial.
Refer to the Online FIR System vendor's website or security advisory page for the official advisory regarding CVE-2026-5665.
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.