Cyber Posture

CVE-2026-26710

CriticalPublic PoC

Published: 02 March 2026

Published
02 March 2026
Modified
03 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 15.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26710 is a critical-severity SQL Injection (CWE-89) vulnerability in Carmelo Simple Food Order System. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents SQL injection by requiring validation and error handling of untrusted inputs to the vulnerable /food/routers/edit-orders.php endpoint.

prevent

Mandates timely identification, reporting, and correction of the SQL injection flaw in Simple Food Order System v1.0.

preventdetect

Enforces boundary protection with web application firewalls or proxies to inspect and block SQL injection payloads targeting the public endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in unauthenticated public-facing web app component directly enables remote exploitation per T1190, with arbitrary query execution for data access/modification/deletion.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/edit-orders.php.

Deeper analysisAI

CVE-2026-26710 is a SQL injection vulnerability (CWE-89) affecting code-projects Simple Food Order System version 1.0, specifically in the /food/routers/edit-orders.php component. Published on 2026-03-02, it has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows arbitrary SQL query execution, potentially leading to unauthorized data access, modification, or deletion within the application's database.

The CVE references a GitHub bug report at https://github.com/Thirtypenny77/bug_report/blob/main/code-projects/simple-food-order-system/SQL-3.md, which documents the issue but does not specify patches or mitigations in the provided details.

Details

CWE(s)

Affected Products

carmelo
simple food order system
1.0

CVEs Like This One

CVE-2026-26711Same product: Carmelo Simple Food Order System
CVE-2026-26712Same product: Carmelo Simple Food Order System
CVE-2026-5017Same product: Carmelo Simple Food Order System
CVE-2026-5018Same product: Carmelo Simple Food Order System
CVE-2026-5019Same product: Carmelo Simple Food Order System
CVE-2026-4319Same product: Carmelo Simple Food Order System
CVE-2026-26713Same product: Carmelo Simple Food Order System
CVE-2026-4533Same product: Carmelo Simple Food Order System
CVE-2026-4532Same product: Carmelo Simple Food Order System
CVE-2026-26695Same vendor: Carmelo

References