Vulnerability Description
A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Carmelo | Simple Food Order System | 1.0 |
Related Weaknesses (CWE)
References
- https://code-projects.org/Product
- https://github.com/6Justdododo6/CVE/issues/17ExploitIssue TrackingMitigation
- https://vuldb.com/submit/779341VDB EntryThird Party Advisory
- https://vuldb.com/vuln/353904Third Party AdvisoryVDB Entry
- https://vuldb.com/vuln/353904/ctiVDB EntryPermissions Required
FAQ
What is CVE-2026-5019?
CVE-2026-5019 is a vulnerability with a CVSS score of 7.3 (HIGH). A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Paramet...
How severe is CVE-2026-5019?
CVE-2026-5019 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5019?
Check the references section above for vendor advisories and patch information. Affected products include: Carmelo Simple Food Order System.