Description
A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /userfinishregister.php of the component Parameter Handler. This manipulation of the argument firstName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Published: 2026-04-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection leading to unauthorized data access or modification
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from improper handling of the firstName argument within the /userfinishregister.php component, allowing an attacker to inject arbitrary SQL statements. The flaw is enumerated as a classical SQL injection violation (CWE‑74) and also raises broader concerns about input validation oversight (CWE‑89). When exploited, an attacker can read, alter, or delete database records, potentially exposing sensitive customer data or disrupting business operations.

Affected Systems

The affected product is Code‑Projects Simple Laundry System version 1.0. The flaw resides in the Parameter Handler component of the web application. No other vendor or product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate‑to‑high severity risk, while the EPSS score is not available and the vulnerability is not listed in KEV. Remote exploitation is explicitly possible, and proof‑of‑concept exploits have been published. Attackers can execute the injection via the firstName field without additional credentials, making the vulnerability readily actionable for remote adversaries.

Generated by OpenCVE AI on April 6, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Simple Laundry System to a patched version that addresses the SQL injection flaw.
  • If no patch is available, implement strict input validation on the firstName parameter to allow only alphanumeric characters or use parameterized queries to eliminate dynamic SQL generation.
  • Restrict or disable access to /userfinishregister.php for unauthenticated or untrusted users until a fix is applied.
  • Deploy a web application firewall rule set that blocks typical SQL injection payloads targeting this endpoint.
  • Continuously monitor application logs for anomalous database queries and perform security audits of input handling.

Generated by OpenCVE AI on April 6, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in code-projects Simple Laundry System 1.0. This vulnerability affects unknown code of the file /userfinishregister.php of the component Parameter Handler. This manipulation of the argument firstName causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
Title code-projects Simple Laundry System Parameter userfinishregister.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T11:17:49.798Z

Reserved: 2026-04-05T20:42:58.768Z

Link: CVE-2026-5648

cve-icon Vulnrichment

Updated: 2026-04-06T11:17:11.193Z

cve-icon NVD

Status : Deferred

Published: 2026-04-06T11:17:03.740

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-5648

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:32:52Z

Weaknesses