Description
A vulnerability has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /modifymember.php of the component Parameter Handler. Such manipulation of the argument firstName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the 1.0 release of Simple Laundry System, located in the modifymember.php file, permits attackers to manipulate the firstName parameter so that it is directly embedded into a SQL statement without proper validation. This omission enables a classic SQL injection attack that can lead to unauthorized data exposure, modification, or deletion. The vulnerability is publicly disclosed and can be triggered from outside the network, making it accessible to remote actors.

Affected Systems

The only documented affected version is the 1.0 release of code‑projects Simple Laundry System. No other version ranges are listed or implied. The weakness resides within the Parameter Handler component handling input for member modification.

Risk and Exploitability

The CVSS base score of 6.9 indicates a medium severity vulnerability. Because the attack vector is remote and requires only a crafted firstName field, the opportunity for exploitation is high on systems where this endpoint is exposed without strict access controls. The EPSS score is unavailable, and the vulnerability has not been listed in CISA’s KEV catalog, but the widely known public disclosure and remote nature suggest that remediation should be prioritized.

Generated by OpenCVE AI on April 5, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an official vendor patch for Simple Laundry System 1.0 if it is available.
  • If a patch is not available, restrict access to the modifymember.php endpoint to authenticated users only.
  • Replace the unparameterized SQL construction with input validation or prepared statements for the firstName field.
  • Limit the database account permissions used by the application so that it cannot perform DML operations beyond what is necessary.

Generated by OpenCVE AI on April 5, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /modifymember.php of the component Parameter Handler. Such manipulation of the argument firstName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Title code-projects Simple Laundry System Parameter modifymember.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T15:32:07.439Z

Reserved: 2026-04-04T06:46:57.293Z

Link: CVE-2026-5540

cve-icon Vulnrichment

Updated: 2026-04-06T15:32:03.431Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T05:16:03.100

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5540

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:13Z

Weaknesses