{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5018","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-27T14:14:10.211Z","datePublished":"2026-03-28T22:30:15.700Z","dateUpdated":"2026-03-30T15:54:42.543Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-28T22:30:15.700Z"},"title":"code-projects Simple Food Order System Parameter register-router.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"code-projects","product":"Simple Food Order System","versions":[{"version":"1.0","status":"affected"}],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in code-projects Simple Food Order System 1.0. Affected is an unknown function of the file register-router.php of the component Parameter Handler. Executing a manipulation of the argument Name can lead to sql injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-27T15:19:21.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XuYue (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/353903","name":"VDB-353903 | code-projects Simple Food Order System Parameter register-router.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/353903/cti","name":"VDB-353903 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/779336","name":"Submit #779336 | code-projects Simple Food Order System V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/6Justdododo6/CVE/issues/16","tags":["exploit","issue-tracking"]},{"url":"https://code-projects.org/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-30T15:54:29.818800Z","id":"CVE-2026-5018","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-30T15:54:42.543Z"}}]}}