Description
A vulnerability has been found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /delstaffinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

/delstaffinfo.php includes an unsanitized userid parameter that allows attackers to inject arbitrary SQL statements. The flaw can be exploited remotely, giving an attacker the ability to read, modify, or delete database records, leading to compromise of the system’s confidentiality, integrity, and availability. The vulnerability is identified as a classic SQL injection (CWE‑89) and also reflects improper handling of user input (CWE‑74).

Affected Systems

The affected product is code‑projects Simple Laundry System version 1.0, specifically the Parameter Handler component that processes the delstaffinfo.php script. Users running this version without a recent update are potentially susceptible to the described injection flaw.

Risk and Exploitability

The stated CVSS score of 6.9 places the vulnerability in the medium severity range. The EPSS figure of less than 1% suggests a low probability of exploitation, and the issue is not listed in the CISA KEV catalog. Attackers would need to send a crafted HTTP request containing a malicious userid value; no authentication is mentioned, so the vulnerability could be triggered from outside the application. Given the public disclosure and the medium impact, organizations should treat this as a moderate risk to their data security.

Generated by OpenCVE AI on April 3, 2026 at 20:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch for Simple Laundry System that resolves the SQL injection issue.
  • If the patch is not immediately available, restrict access to the delstaffinfo.php endpoint to administrators only, using web server authentication or firewall rules.
  • Implement input validation or switch to parameterized queries in the application to prevent arbitrary SQL execution.
  • Monitor database logs for anomalous query patterns that may indicate exploitation attempts.

Generated by OpenCVE AI on April 3, 2026 at 20:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:code-projects:simple_laundry_system:1.0:*:*:*:*:*:*:*

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /delstaffinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Simple Laundry System Parameter delstaffinfo.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-01T15:50:17.586Z

Reserved: 2026-03-31T16:17:51.772Z

Link: CVE-2026-5257

cve-icon Vulnrichment

Updated: 2026-04-01T15:41:25.302Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-01T06:16:16.363

Modified: 2026-04-03T17:29:40.033

Link: CVE-2026-5257

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:22Z

Weaknesses