{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5564","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-04T14:14:23.742Z","datePublished":"2026-04-05T11:30:12.521Z","dateUpdated":"2026-04-06T16:18:50.776Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-05T11:30:12.521Z"},"title":"code-projects Simple Laundry System Parameter searchguest.php sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"code-projects","product":"Simple Laundry System","versions":[{"version":"1.0","status":"affected"}],"cpes":["cpe:2.3:a:code-projects:simple_laundry_system:*:*:*:*:*:*:*:*"],"modules":["Parameter Handler"]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in code-projects Simple Laundry System 1.0. Affected by this vulnerability is an unknown functionality of the file /searchguest.php of the component Parameter Handler. This manipulation of the argument searchServiceId causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-04T16:19:34.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"kazamikazu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/355334","name":"VDB-355334 | code-projects Simple Laundry System Parameter searchguest.php sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/355334/cti","name":"VDB-355334 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/782976","name":"Submit #782976 | code-projects Simple Laundry System V1.0 SQL injection","tags":["third-party-advisory"]},{"url":"https://github.com/Kazamikazu/Ksec/issues/2","tags":["exploit","issue-tracking"]},{"url":"https://code-projects.org/","tags":["product"]}],"tags":["x_freeware"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-06T16:18:35.811978Z","id":"CVE-2026-5564","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-06T16:18:50.776Z"}}]}}