Description
A flaw has been found in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /modifymember.php of the component Parameter Handler. This manipulation of the argument firstName causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Remote)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a cross‑site scripting flaw located in the Parameter Handler component of Simple Laundry System 1.0. By manipulating the firstName argument in /modifymember.php, an attacker can inject arbitrary JavaScript that will be executed in the context of any user visiting the affected page. The flaw can be triggered from an external network, so it is remotely exploitable. This allows an attacker to deface the interface, steal session cookies, or perform other malicious actions within the victim’s browser session.

Affected Systems

The flaw affects code‑projects Simple Laundry System version 1.0. No other product versions are listed in the CNA data.

Risk and Exploitability

The CVSS v3.1 score of 5.3 marks the vulnerability as moderate severity. No EPSS score is provided, and it is not included in the CISA KEV list, suggesting that widespread exploitation may not yet be documented. However, the existence of a published exploit indicates that attackers could potentially leverage it if the vulnerable system remains unpatched. Remote exploitation requires only the ability to send crafted input to modifymember.php, and no privileged credentials are necessary.

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s official patch or upgrade to a newer version of the Simple Laundry System that fixes the firstName XSS injection.
  • If no patch is available, neutralise the vulnerability by validating, escaping or removing any script content from the firstName input before rendering it.
  • Configure a web application firewall to block or escape script payloads targeting the /modifymember.php endpoint.
  • Verify that the application does not expose the vulnerable endpoint to untrusted users and consider restricting access to the modifymember.php URL.

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /modifymember.php of the component Parameter Handler. This manipulation of the argument firstName causes cross site scripting. The attack can be initiated remotely. The exploit has been published and may be used.
Title code-projects Simple Laundry System Parameter modifymember.php cross site scripting
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T02:38:44.818Z

Reserved: 2026-04-04T06:46:53.555Z

Link: CVE-2026-5539

cve-icon Vulnrichment

Updated: 2026-04-07T02:38:34.400Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T04:16:16.150

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5539

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:15Z

Weaknesses