{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5019","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-03-27T14:14:13.126Z","datePublished":"2026-03-28T23:30:12.263Z","dateUpdated":"2026-03-30T13:29:17.174Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-03-28T23:30:12.263Z"},"title":"code-projects Simple Food Order System Parameter all-orders.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"code-projects","product":"Simple Food Order System","versions":[{"version":"1.0","status":"affected"}],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-03-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-03-27T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-03-27T15:19:23.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"XuYue (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/353904","name":"VDB-353904 | code-projects Simple Food Order System Parameter all-orders.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/353904/cti","name":"VDB-353904 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/779341","name":"Submit #779341 | code-projects Simple Food Order System V1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/6Justdododo6/CVE/issues/17","tags":["exploit","issue-tracking"]},{"url":"https://code-projects.org/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-30T13:29:03.421634Z","id":"CVE-2026-5019","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-30T13:29:17.174Z"}}]}}