Description
A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-03-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data compromise via SQL injection
Action: Patch immediately
AI Analysis

Impact

The Simple Food Order System 1.0 contains a SQL injection flaw in the all-orders.php component triggered by manipulating the Status parameter. An attacker can inject arbitrary SQL statements, potentially exposing sensitive data or altering records in the database. The described vulnerability permits direct exploitation of the database layer without requiring authentication.

Affected Systems

Affected products include code-projects Simple Food Order System version 1.0, accessible through the all-orders.php script. The issue emerges from the Parameter Handler component and can affect any deployment running this version of the application.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, while an EPSS score below one percent suggests a low expected exploitation rate. The vulnerability is not currently listed in CISA’s KEV catalog, though it is publicly disclosed. Based on the description, the attack vector is remote via a web interface, so any exposed instance of the application could be targeted. While exploitation probability is low, the potential impact on data confidentiality and integrity warrants timely remediation.

Generated by OpenCVE AI on April 2, 2026 at 23:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor release channel for an updated version of the Simple Food Order System that fixes the SQL injection flaw.
  • If a patch is unavailable, restrict the database user privileges used by the application to the minimum required rights.
  • Implement proper input validation or parameterized queries for the Status parameter in all-orders.php to prevent SQL injection.
  • Monitor web application traffic for suspicious query patterns and log attempts to inject SQL.

Generated by OpenCVE AI on April 2, 2026 at 23:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Carmelo
Carmelo simple Food Order System
CPEs cpe:2.3:a:carmelo:simple_food_order_system:1.0:*:*:*:*:*:*:*
Vendors & Products Carmelo
Carmelo simple Food Order System

Mon, 30 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Code-projects
Code-projects simple Food Order System
Vendors & Products Code-projects
Code-projects simple Food Order System

Sun, 29 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Simple Food Order System Parameter all-orders.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Carmelo Simple Food Order System
Code-projects Simple Food Order System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T13:29:17.174Z

Reserved: 2026-03-27T14:14:13.126Z

Link: CVE-2026-5019

cve-icon Vulnrichment

Updated: 2026-03-30T13:29:11.649Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-29T00:16:13.673

Modified: 2026-04-02T20:31:19.263

Link: CVE-2026-5019

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:25Z

Weaknesses