Description
A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection enabling unauthorized database access
Action: Immediate Patch
AI Analysis

Impact

The Simple Food Order System in version 1.0 contains a SQL injection flaw in an unknown function within register-router.php that accepts a manipulated name parameter. This weakness, identified as a type of input validation failure, allows an attacker to inject arbitrary SQL commands. Successful exploitation could compromise the confidentiality and integrity of the underlying database, leading to data exposure, modification, or deletion.

Affected Systems

The vulnerability affects the Simple Food Order System developed by code-projects, specifically the component that handles request parameter registration. Known affected version is 1.0, as referenced by the vendor's CPE string. System administrators should verify that this exact version is deployed before taking action.

Risk and Exploitability

The CVSS score of 6.9 classifies the issue as a medium severity problem, and the EPSS score indicates a very low probability of exploitation. However, because the flaw is exploitable remotely and a public exploit exists, the risk remains non‑negligible. The vulnerability is not listed in the CISA KEV catalog. Attackers who can reach the application over the network could potentially manipulate the name argument to execute arbitrary SQL queries.

Generated by OpenCVE AI on April 2, 2026 at 23:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a secure version of the Simple Food Order System (if available).
  • If a patch is not yet released, manually sanitize or whitelist the name parameter to prevent injection.

Generated by OpenCVE AI on April 2, 2026 at 23:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Food Order System
CPEs cpe:2.3:a:carmelo:simple_food_order_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Food Order System

Mon, 30 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Food Order System
Vendors & Products Code-projects
Code-projects simple Food Order System

Sun, 29 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.
Title code-projects Simple Food Order System Parameter register-router.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Food Order System
Code-projects Simple Food Order System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T15:54:42.543Z

Reserved: 2026-03-27T14:14:10.211Z

Link: CVE-2026-5018

cve-icon Vulnrichment

Updated: 2026-03-30T15:54:37.718Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-28T23:16:44.663

Modified: 2026-04-02T20:33:27.493

Link: CVE-2026-5018

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:26Z

Weaknesses