Description
A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Simple Laundry System 1.0 file /modstaffinfo.php allows attackers to inject SQL code by manipulating the userid argument. This can lead to unauthorized reading, modification or deletion of database records, potentially exposing sensitive customer information and disrupting business operations.

Affected Systems

The vulnerability affects the Simple Laundry System from code‑projects, specifically version 1.0. Systems running this build, particularly the /modstaffinfo.php component, must be evaluated for exposure.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium to high impact if exploited. The EPSS score is less than 1%, showing a low overall exploitation probability, but the CVE description states that an exploit has already been released to the public, so attackers can attempt it immediately. The attack vector is remote, requiring web access to the affected application and the ability to supply a crafted userid parameter. Although publicly available exploits are not yet confirmed to be widely used, the presence of a known exploit script means that administrators should not delay remediation.

Generated by OpenCVE AI on April 3, 2026 at 20:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or upgrade Simple Laundry System to a version that fixes the SQL injection flaw.
  • If a patch is not yet available, restrict access to modstaffinfo.php to authenticated administrators and implement input validation to sanitize the userid parameter.
  • Deploy a web application firewall to detect and block suspicious SQL injection attempts and monitor web server logs for anomalous query patterns.

Generated by OpenCVE AI on April 3, 2026 at 20:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*

Fri, 27 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 04:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
Title code-projects Simple Laundry System Parameter modstaffinfo.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-27T19:58:56.622Z

Reserved: 2026-03-26T16:03:39.304Z

Link: CVE-2026-4908

cve-icon Vulnrichment

Updated: 2026-03-27T13:25:38.832Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-27T03:16:01.670

Modified: 2026-04-03T17:51:12.783

Link: CVE-2026-4908

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:18:02Z

Weaknesses