Description
A security vulnerability has been detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /userchecklogin.php. Such manipulation of the argument userid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-04-08
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: Remote SQL Injection enabling unauthorized data access and modification
Action: Immediate Patch
AI Analysis

Impact

The Simple Laundry System contains a flaw in the userchecklogin.php module where the userid argument is concatenated directly into SQL statements without adequate sanitization. This weakness is a classic instance of CWE‑89: Improper Neutralization of Special Elements used in an SQL Command, and can be leveraged through the less common CWE‑74 techniques to obfuscate the injected payload. An attacker can supply a crafted userid that causes the database to execute arbitrary SELECT, UPDATE, or DELETE commands, potentially revealing customer data, altering account balances, or deleting records.

Affected Systems

Affected product is the code‑projects Simple Laundry System, version 1.0. The vulnerability resides in the userchecklogin.php file handling the userid parameter. No other versions or components are noted as affected in the CVE record.

Risk and Exploitability

The CVSS score of 6.9 denotes a medium severity flaw. Because the exploit can be triggered remotely via the userid input, an unauthenticated attacker can obtain or modify sensitive information. No EPSS score is reported, and the issue is not listed in the CISA KEV catalog, indicating that public exploitation may not yet be widespread, but the presence of a publicly disclosed method increases the risk of targeted attacks. Proper database access controls and input validation are therefore essential to mitigate potential impacts.

Generated by OpenCVE AI on April 9, 2026 at 01:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑issued patch that validates or parameterizes the userid input in userchecklogin.php.
  • If no patch is available, modify the application code to use prepared statements or escape special characters in the userid value before embedding it in SQL queries.
  • Restrict the database credentials used by the application to the minimal permissions required for normal operation, limiting the damage from a compromised query.
  • Enable logging for all database interactions and monitor for anomalous SELECT, UPDATE, or DELETE statements that may indicate injection activity.

Generated by OpenCVE AI on April 9, 2026 at 01:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /userchecklogin.php. Such manipulation of the argument userid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.
Title code-projects Simple Laundry System userchecklogin.php sql injection
First Time appeared Code-projects
Code-projects simple Laundry System
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*
Vendors & Products Code-projects
Code-projects simple Laundry System
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Code-projects Simple Laundry System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-08T23:45:12.677Z

Reserved: 2026-04-08T16:49:42.498Z

Link: CVE-2026-5824

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-09T00:16:21.280

Modified: 2026-04-09T00:16:21.280

Link: CVE-2026-5824

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:25:25Z

Weaknesses