Impact
The flaw resides in an unnamed function within the checkregisitem.php Parameter Handler. By supplying a crafted value for the Long-arm-shirtVol argument, an attacker can inject arbitrary SQL commands into the backend query. The injection can be performed from a remote web request, exposing the system to unauthorized data disclosure, modification, or potentially broader compromise depending on database privileges. The vulnerability aligns with CWE‑74 (Incorrect Parameter Handling) and CWE‑89 (SQL Injection). With a CVSS score of 6.9, the severity is moderate, indicating significant potential damage if exploited. Publicly released exploits mean the threat is tangible for installations still running the vulnerable code.
Affected Systems
Vulnerable editions are identified as code‑projects Simple Laundry System version 1.0. The affected component is the Parameter Handler within the checkregisitem.php file of the Simple Laundry System application. Any deployment running this exact version on a web server that accepts HTTP requests to checkregisitem.php is at risk.
Risk and Exploitability
The exploit can be launched remotely via crafted HTTP requests and is publicly available, making it accessible to attackers with minimal effort. The EPSS score of less than 1% indicates a low but non-zero probability of exploitation in the near future, while the lack of inclusion in the CISA KEV catalog suggests the vulnerability has not yet become a widespread known target. Nonetheless, the combination of remote access and credentialless injection elevates the risk to organizations hosting the Simple Laundry System. Prompt remediation is advised to avoid potential data loss or control takeover.
OpenCVE Enrichment