Description
A vulnerability was determined in code-projects Simple Laundry System 1.0. Impacted is an unknown function of the file /modstaffinfo.php of the component Parameter Handler. Executing a manipulation of the argument userid can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Published: 2026-04-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply Mitigation
AI Analysis

Impact

The vulnerability exists in the file /modstaffinfo.php of the Simple Laundry System, where an attacker can manipulate the userid argument to inject arbitrary script content. This reflects the classic CWE‑79 cross‑site scripting weakness and, because the attacker controls input to the Parameter Handler, it could potentially execute server‑side code as indicated by the presence of CWE‑94. The primary impact is that a remote user could inject malicious JavaScript that would run in the browser of any viewing user, enabling session hijacking, credential theft, or defacement of pages.

Affected Systems

Affected systems are installations of the code‑projects Simple Laundry System, version 1.0 as referenced in the description. The exploit targets the modstaffinfo.php module; no other versions or products are explicitly mentioned, so the scope appears limited to this component in that version.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog, reducing immediate urgency. However, the attack vector is remote and publicly disclosed, meaning that with no patch available an attacker could feasibly exploit it on any exposed instance. The lack of a fix and the ability to run arbitrary client‑side code make the threat significant for authenticated and unauthenticated users if the application does not enforce proper access controls.

Generated by OpenCVE AI on April 5, 2026 at 06:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or repository for a newer version of Simple Laundry System that addresses the XSS issue.
  • If no update exists, restrict direct access to /modstaffinfo.php to authenticated staff only, and enforce least‑privilege access control.
  • Validate and sanitize the userid parameter on both client and server sides, ensuring it contains only expected numeric or alphanumeric characters.
  • Apply output‑encoding or use a templating engine that automatically escapes user‑controlled data before rendering.
  • Deploy a Web Application Firewall rule set that detects and blocks reflected XSS payloads, and monitor logs for suspicious requests.

Generated by OpenCVE AI on April 5, 2026 at 06:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in code-projects Simple Laundry System 1.0. Impacted is an unknown function of the file /modstaffinfo.php of the component Parameter Handler. Executing a manipulation of the argument userid can lead to cross site scripting. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.
Title code-projects Simple Laundry System Parameter modstaffinfo.php cross site scripting
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-79
CWE-94
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T17:59:33.893Z

Reserved: 2026-04-04T06:47:04.126Z

Link: CVE-2026-5542

cve-icon Vulnrichment

Updated: 2026-04-06T17:59:29.753Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T05:16:04.537

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5542

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:57:11Z

Weaknesses