๐Ÿ” CVE Alert

CVE-2026-5019

HIGH 7.3

code-projects Simple Food Order System Parameter all-orders.php sql injection

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
9th

A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

CWE CWE-89 CWE-74
Vendor code-projects
Product simple food order system
Published Mar 28, 2026
Last Updated Mar 30, 2026
Stay Ahead of the Next One

Get instant alerts for code-projects simple food order system

Be the first to know when new high vulnerabilities affecting code-projects simple food order system are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

code-projects / Simple Food Order System
1.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/353904 vuldb.com: https://vuldb.com/vuln/353904/cti vuldb.com: https://vuldb.com/submit/779341 github.com: https://github.com/6Justdododo6/CVE/issues/17 code-projects.org: https://code-projects.org/

Credits

๐Ÿ” XuYue (VulDB User)