Impact
A flaw in the Simple Laundry System allows an attacker to supply a crafted firstName value to the /modify.php endpoint. The unsanitized input leads to SQL injection, permitting the attacker to execute arbitrary SQL statements. As a result, confidentiality and integrity of the database could be compromised, allowing sensitive data disclosure or modification.
Affected Systems
The vulnerability impacts the code-projects Simple Laundry System version 1.0, affecting the component Parameter Handler accessed via /modify.php.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog, yet the exploit has been published and can be executed remotely through a web request.
OpenCVE Enrichment