Description
A vulnerability was found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /modmemberinfo.php of the component Parameter Handler. Performing a manipulation of the argument userid results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability is a reflected cross‑site scripting flaw in the Simple Laundry System 1.0 component that processes the userid argument in /modmemberinfo.php. By inserting malicious HTML or JavaScript into the userid parameter, a remote attacker can cause the victim’s browser to execute the payload, potentially allowing defacement, cookie theft, or further attacks against the user.

Affected Systems

The flaw exists in the code‑projects Simple Laundry System 1.0. No other versions are confirmed to be impacted, but any instance of this legacy application that has not applied the vendor’s fix is vulnerable.

Risk and Exploitability

With a CVSS score of 5.3 the vulnerability is considered moderate. The exploit can be triggered from any Internet‑connected client with no authentication, and the vulnerability has already been made public. Although it is not listed in the KEV catalog and no EPSS score is available, the availability of the exploit and the remote nature of the attack vector raise the risk level for environments that expose this application to untrusted users.

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Laundry System to the latest released version or apply the vendor‑supplied patch that corrects the userid handling in modmemberinfo.php.
  • If a patch is not available, modify modmemberinfo.php so that the userid value is validated against a whitelist of expected numeric IDs and any output is properly HTML‑escaped or encoded.
  • Deploy a web application firewall or content security policy that blocks or sanitizes scripts injected via user input.
  • Perform regular penetration testing or vulnerability scanning to confirm that no similar input validation issues remain.

Generated by OpenCVE AI on April 5, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in code-projects Simple Laundry System 1.0. This issue affects some unknown processing of the file /modmemberinfo.php of the component Parameter Handler. Performing a manipulation of the argument userid results in cross site scripting. The attack may be initiated remotely. The exploit has been made public and could be used.
Title code-projects Simple Laundry System Parameter modmemberinfo.php cross site scripting
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:51:12.077Z

Reserved: 2026-04-04T06:47:00.519Z

Link: CVE-2026-5541

cve-icon Vulnrichment

Updated: 2026-04-06T14:46:40.247Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T05:16:04.310

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5541

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:12Z

Weaknesses