Description
A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Published: 2026-03-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection – potential data compromise
Action: Patch Now
AI Analysis

Impact

A flaw in the Simple Food Order System’s add‐item.php script allows an attacker to tamper with the price parameter, producing an SQL injection that can read or modify the database. The injection can be triggered entirely remotely via an HTTP request, and the vulnerability is publicly available, making exploitation straightforward for hostile actors.

Affected Systems

The vulnerability affects the code‑projects Simple Food Order System version 1.0. No other versions are listed in the advisory, so the impact is confined to the bundled add‑item.php code of that specific release.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, while the EPSS score of less than 1% suggests that large‑scale exploitation is unlikely at present. The vulnerability is not yet in the CISA KEV catalog. Attackers could exploit the flaw from the internet by sending crafted requests to the remote add‑item.php endpoint without requiring any special credentials, and publicly available exploit code raises the risk for opportunistic attacks.

Generated by OpenCVE AI on April 8, 2026 at 23:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patch or update to Simple Food Order System that sanitizes the price parameter and uses parameterized queries.
  • If a patch is not immediately available, restrict access to the add-item.php endpoint to authenticated users or limit it to trusted IP addresses.
  • Verify that all user inputs used in database statements are properly validated and sanitized before execution.
  • Check the vendor’s website or repository for any additional updates or security advisories.

Generated by OpenCVE AI on April 8, 2026 at 23:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Food Order System
CPEs cpe:2.3:a:carmelo:simple_food_order_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Food Order System

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Food Order System
Vendors & Products Code-projects
Code-projects simple Food Order System

Tue, 17 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Title code-projects Simple Food Order System add-item.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Food Order System
Code-projects Simple Food Order System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T17:21:02.768Z

Reserved: 2026-03-17T10:25:49.935Z

Link: CVE-2026-4319

cve-icon Vulnrichment

Updated: 2026-03-17T17:19:40.971Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T18:16:17.827

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-4319

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:45Z

Weaknesses