Description
A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Published: 2026-03-17
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in the Simple Food Order System due to improper validation of the 'price' parameter in the /routers/add-item.php file, allowing malicious SQL statements to be executed. The impact is that an attacker can read, modify, or delete arbitrary database records, compromising confidentiality and integrity of the application data. The flaw is categorized as CWE-74 (Command Injection) and CWE-89 (SQL Injection). Key detail from vendor description: Such manipulation of the argument price leads to sql injection.

Affected Systems

The affected product is code-projects’ Simple Food Order System. No explicit version information is provided in the CVE data; therefore it is unclear which releases are vulnerable. The vulnerability resides in the add-item.php endpoint of the router layer.

Risk and Exploitability

The CVSS v3.1 base score is 6.9, indicating moderate severity. EPSS information is not available. The vulnerability is not listed in the CISA KEV catalog. The attack vector is remote, as stated in the CVE description: The attack can be launched remotely. Exploitation is publicly available, implying that attackers who can reach the vulnerable endpoint may easily perform the injection.

Generated by OpenCVE AI on March 17, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any vendor patch that addresses the SQL injection flaw in Simple Food Order System.
  • If no patch is available, sanitize the 'price' input by validating that it contains only numeric characters before including it in SQL statements.
  • Restrict access to /routers/add-item.php to authorized administrative users only.
  • Monitor web server and database logs for suspicious SQL queries or error messages that may indicate exploitation attempts.

Generated by OpenCVE AI on March 17, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Food Order System
CPEs cpe:2.3:a:carmelo:simple_food_order_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Food Order System

Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Food Order System
Vendors & Products Code-projects
Code-projects simple Food Order System

Tue, 17 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file /routers/add-item.php. Such manipulation of the argument price leads to sql injection. The attack can be launched remotely. The exploit is publicly available and might be used.
Title code-projects Simple Food Order System add-item.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Food Order System
Code-projects Simple Food Order System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T17:21:02.768Z

Reserved: 2026-03-17T10:25:49.935Z

Link: CVE-2026-4319

cve-icon Vulnrichment

Updated: 2026-03-17T17:19:40.971Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-17T18:16:17.827

Modified: 2026-04-08T21:02:05.880

Link: CVE-2026-4319

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:49:09Z

Weaknesses