Description
A vulnerability was detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /delstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Published: 2026-04-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote cross‑site scripting that allows arbitrary JavaScript execution in victims’ browsers
Action: Patch Immediately
AI Analysis

Impact

The flaw resides in the /delstaffinfo.php script of code‑projects Simple Laundry System. Manipulation of the userid argument triggers a reflected cross‑site scripting vulnerability. When an attacker delivers a crafted request to the vulnerable endpoint, the browser will execute the injected JavaScript in the context of the web application, potentially exposing sensitive data, defacing the interface, or redirecting users to malicious sites.

Affected Systems

This vulnerability affects only code‑projects Simpl​e Laundry System version 1.0. No other versions or components are listed as affected. The attack vector is a remote request to the /delstaffinfo.php page, with the userid parameter containing malicious payload.

Risk and Exploitability

The CVSS base score of 5.3 indicates moderate severity. An EPSS score of less than 1 % reflects a low likelihood of widespread exploitation at present, and the flaw is not in the CISA KEV catalog. The description explicitly states that the attack may be launched remotely, meaning an attacker only needs to construct a malicious URL; no privileged access or additional conditions are required.

Generated by OpenCVE AI on April 3, 2026 at 21:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any vendor‑issued patch or update that addresses this XSS defect.
  • If no patch is available, restrict access to /delstaffinfo.php so that only authenticated staff with appropriate privileges can reach the endpoint.
  • Implement server‑side input validation and output‑encoding for the userid parameter to neutralize injected scripts.

Generated by OpenCVE AI on April 3, 2026 at 21:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 05:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /delstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
Title code-projects Simple Laundry System Parameter delstaffinfo.php cross site scripting
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T16:36:29.602Z

Reserved: 2026-03-31T16:17:45.849Z

Link: CVE-2026-5255

cve-icon Vulnrichment

Updated: 2026-04-03T16:36:22.519Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T06:16:15.503

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T08:07:38Z

Weaknesses