Description
A security vulnerability has been detected in code-projects Simple Laundry System 1.0. Affected by this issue is some unknown functionality of the file /delmemberinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-05
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection that can compromise data confidentiality and integrity
Action: Patch
AI Analysis

Impact

The vulnerability resides in the file /delmemberinfo.php of the Simple Laundry System component Parameter Handler. An attacker can manipulate the userid argument, which is not properly sanitized, leading to an SQL injection flaw. This flaw would allow the attacker to execute arbitrary SQL statements against the database, potentially exposing, modifying or deleting sensitive information. The weakness is consistent with CWE-74 and CWE-89 standard categories. The severity score of 6.9 indicates a moderate risk of data loss or tampering.

Affected Systems

The affected product is code-projects Simple Laundry System version 1.0. Users running this version should verify that the delmemberinfo.php endpoint is protected and update their installation as necessary.

Risk and Exploitability

The CVSS score of 6.9 reflects a moderate level of risk, and the vulnerability can be exploited remotely as it can be triggered by sending a crafted request to the exposed endpoint. EPSS information is not available and the vulnerability is not in the KEV catalog, but the publicly disclosed exploit implies that attackers can attempt to exploit it. The likely attack vector is a remote HTTP request that includes a malicious userid parameter to inject SQL commands.

Generated by OpenCVE AI on April 5, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's latest patch or upgrade to a newer version of Simple Laundry System if available
  • Configure the /delmemberinfo.php endpoint to require authentication and restrict access to authorized users only
  • Implement input validation or parameterized queries for the userid argument to eliminate SQL injection opportunity
  • Monitor web server logs for unusual requests to the delmemberinfo.php endpoint and investigate promptly
  • Maintain regular database backups and verify recovery procedures to recover from potential data loss

Generated by OpenCVE AI on April 5, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 05 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple Laundry System 1.0. Affected by this issue is some unknown functionality of the file /delmemberinfo.php of the component Parameter Handler. Such manipulation of the argument userid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Simple Laundry System Parameter delmemberinfo.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T02:50:37.568Z

Reserved: 2026-04-04T14:14:27.307Z

Link: CVE-2026-5565

cve-icon Vulnrichment

Updated: 2026-04-07T02:50:34.301Z

cve-icon NVD

Status : Deferred

Published: 2026-04-05T13:17:13.433

Modified: 2026-04-24T18:14:34.620

Link: CVE-2026-5565

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:56:48Z

Weaknesses