Description
A weakness has been identified in code-projects Simple Laundry System 1.0. Affected by this vulnerability is an unknown functionality of the file /searchguest.php of the component Parameter Handler. This manipulation of the argument searchServiceId causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A weakness in the Simple Laundry System 1.0 allows an attacker to inject arbitrary SQL through manipulation of the searchServiceId parameter in the /searchguest.php file. This flaw is a classic SQL injection that can be triggered remotely and has publicly available exploit code. Successful exploitation would give the attacker the ability to read, modify, or delete data stored in the underlying database, compromising both confidentiality and integrity of the system.

Affected Systems

The vulnerability affects the code-projects Simple Laundry System version 1.0. No other versions have been documented in the available data.

Risk and Exploitability

The CVSS base score of 6.9 indicates moderate severity, but the attack can be performed over the network and exploits have already been released. With no EPSS data and the vulnerability not listed in the KEV catalog, the risk remains significant. Attackers could easily execute arbitrary SQL statements if the parameter is not properly sanitized or parameterized. The security impact is wide‑ranging and could lead to full data compromise.

Generated by OpenCVE AI on April 5, 2026 at 14:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor patch for the Simple Laundry System 1.0 that addresses the SQL injection in /searchguest.php.
  • If no patch is available, sanitize the searchServiceId input and use parameterized queries or prepared statements in the database layer.
  • As a temporary measure, disable or remove the /searchguest.php functionality until a secure implementation is deployed.

Generated by OpenCVE AI on April 5, 2026 at 14:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 18:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 12:00:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in code-projects Simple Laundry System 1.0. Affected by this vulnerability is an unknown functionality of the file /searchguest.php of the component Parameter Handler. This manipulation of the argument searchServiceId causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title code-projects Simple Laundry System Parameter searchguest.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T16:18:50.776Z

Reserved: 2026-04-04T14:14:23.742Z

Link: CVE-2026-5564

cve-icon Vulnrichment

Updated: 2026-04-06T16:18:45.501Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T12:16:18.927

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5564

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:49Z

Weaknesses