Description
A vulnerability was identified in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /viewdetail.php of the component Parameters Handler. The manipulation of the argument serviceId leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Published: 2026-03-23
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

A flaw in the Parameters Handler component of the Simple Laundry System allows an attacker to alter the serviceId request parameter in viewdetail.php, leading to a classic SQL injection vulnerability. By injecting malicious SQL, an adversary can read, modify or delete rows in the underlying database, potentially exposing customer data, tampering with business logic, or disrupting service availability. The weakness is identified as CWE-89 and CWE-74, reflecting improper input handling and unsafe embedding of user data in SQL statements.

Affected Systems

The vulnerability exists in code-projects Simple Laundry System version 1.0. Administrators of installations running this product should verify if the Parameters Handler or the viewdetail.php component remains unchanged. No older or newer versions are explicitly referenced in this advisory, so any deployments of the 1.0 build are considered affected.

Risk and Exploitability

The CVSS base score of 6.9 indicates a moderate risk level. Exploitation is feasible over the network, requiring only the ability to send a crafted HTTP request to the Parameters Handler. The EPSS score is below 1%, suggesting that publicly available exploit code is unlikely to be actively used at this time. The vulnerability is not listed in CISA’s KEV catalog. Nevertheless, because the flaw permits remote code manipulation of database queries, any attacker who can reach the web interface can achieve persistence and data compromise.

Generated by OpenCVE AI on April 3, 2026 at 20:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to the latest release of Simple Laundry System.
  • If a patch is unavailable, modify the serviceId parameter handling to use parameterized queries or stored procedures, and restrict database user privileges.
  • Deploy a web application firewall rule that blocks obvious SQL injection patterns targeting the Parameters Handler endpoint.
  • Continuously monitor web logs for suspicious attempts to manipulate serviceId or other request parameters and alert on repeated failures or errors.

Generated by OpenCVE AI on April 3, 2026 at 20:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 07:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /viewdetail.php of the component Parameters Handler. The manipulation of the argument serviceId leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Title code-projects Simple Laundry System Parameters viewdetail.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T13:54:29.710Z

Reserved: 2026-03-22T08:53:30.852Z

Link: CVE-2026-4579

cve-icon Vulnrichment

Updated: 2026-03-23T13:54:24.615Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T08:16:18.250

Modified: 2026-04-03T17:48:41.650

Link: CVE-2026-4579

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:18:10Z

Weaknesses