Description
A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the file /checkregisitem.php of the component Parameter Handler. The manipulation of the argument Long-arm-shirtVol results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-26
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection enabling unauthorized data access and potential system compromise
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in an unnamed function within the checkregisitem.php Parameter Handler. By supplying a crafted value for the Long-arm-shirtVol argument, an attacker can inject arbitrary SQL commands into the backend query. The injection can be performed from a remote web request, exposing the system to unauthorized data disclosure, modification, or potentially broader compromise depending on database privileges. The vulnerability aligns with CWE‑74 (Incorrect Parameter Handling) and CWE‑89 (SQL Injection). With a CVSS score of 6.9, the severity is moderate, indicating significant potential damage if exploited. Publicly released exploits mean the threat is tangible for installations still running the vulnerable code.

Affected Systems

Vulnerable editions are identified as code‑projects Simple Laundry System version 1.0. The affected component is the Parameter Handler within the checkregisitem.php file of the Simple Laundry System application. Any deployment running this exact version on a web server that accepts HTTP requests to checkregisitem.php is at risk.

Risk and Exploitability

The exploit can be launched remotely via crafted HTTP requests and is publicly available, making it accessible to attackers with minimal effort. The EPSS score of less than 1% indicates a low but non-zero probability of exploitation in the near future, while the lack of inclusion in the CISA KEV catalog suggests the vulnerability has not yet become a widespread known target. Nonetheless, the combination of remote access and credentialless injection elevates the risk to organizations hosting the Simple Laundry System. Prompt remediation is advised to avoid potential data loss or control takeover.

Generated by OpenCVE AI on April 3, 2026 at 20:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to a patched version of Simple Laundry System if available.
  • Restrict external access to /checkregisitem.php via firewall or authentication.
  • Limit use of the Long-arm-shirtVol parameter where possible.
  • Implement input validation and prepared statements to mitigate SQL injection.
  • Monitor database and web server logs for unusual queries.

Generated by OpenCVE AI on April 3, 2026 at 20:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*

Thu, 26 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Simple Laundry System 1.0. Affected is an unknown function of the file /checkregisitem.php of the component Parameter Handler. The manipulation of the argument Long-arm-shirtVol results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title code-projects Simple Laundry System Parameter checkregisitem.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T13:49:31.302Z

Reserved: 2026-03-25T14:55:28.859Z

Link: CVE-2026-4850

cve-icon Vulnrichment

Updated: 2026-03-26T13:49:28.122Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T08:16:22.447

Modified: 2026-04-03T17:51:38.177

Link: CVE-2026-4850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:18:04Z

Weaknesses