Description
A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Published: 2026-03-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker to inject malicious SQL code through the Status argument in all-tickets.php. This manipulation can pivot the database engine to execute arbitrary SQL statements, potentially exposing, altering, or deleting sensitive data stored by the application.

Affected Systems

The affected product is the Simple Food Ordering System by code-projects, version 1.0. The vulnerability resides in all-tickets.php and is specific to this version of the application.

Risk and Exploitability

The CVSS score of 5.3 places this issue in the medium severity range, while an EPSS score below 1% indicates a low probability of active exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the attack vector is remote, as the attacker can trigger the injection from an external environment by supplying crafted values for the Status parameter.

Generated by OpenCVE AI on April 3, 2026 at 00:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch for Simple Food Ordering System or upgrade to a version that has addressed the all-tickets.php injection.
  • If a patch is not available, modify the application to use prepared statements or parameterized queries for all database interactions involving the Status parameter.
  • Sanitize and whitelist acceptable values for the Status input before it reaches the database layer.
  • Deploy a web application firewall rule to detect and block suspicious SQL injection patterns targeting the all-tickets.php endpoint.
  • Monitor application logs for failed or suspicious authentication attempts and unauthorized database queries to detect exploitation early.

Generated by OpenCVE AI on April 3, 2026 at 00:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Food Order System
CPEs cpe:2.3:a:carmelo:simple_food_order_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Food Order System

Mon, 23 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Food Ordering System
Vendors & Products Code-projects
Code-projects simple Food Ordering System

Sun, 22 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Simple Food Ordering System 1.0. Affected by this issue is some unknown functionality of the file all-tickets.php. The manipulation of the argument Status results in sql injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Title code-projects Simple Food Ordering System all-tickets.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Food Order System
Code-projects Simple Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:20:57.922Z

Reserved: 2026-03-21T08:03:34.721Z

Link: CVE-2026-4533

cve-icon Vulnrichment

Updated: 2026-03-23T16:20:51.364Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-22T03:16:01.587

Modified: 2026-04-02T20:51:31.500

Link: CVE-2026-4533

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:17Z

Weaknesses