CVE-2026-26710
Published: 02 March 2026
Summary
CVE-2026-26710 is a critical-severity SQL Injection (CWE-89) vulnerability in Carmelo Simple Food Order System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection by requiring validation and error handling of untrusted inputs to the vulnerable /food/routers/edit-orders.php endpoint.
Mandates timely identification, reporting, and correction of the SQL injection flaw in Simple Food Order System v1.0.
Enforces boundary protection with web application firewalls or proxies to inspect and block SQL injection payloads targeting the public endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing web app component directly enables remote exploitation per T1190, with arbitrary query execution for data access/modification/deletion.
NVD Description
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/edit-orders.php.
Deeper analysisAI
CVE-2026-26710 is a SQL injection vulnerability (CWE-89) affecting code-projects Simple Food Order System version 1.0, specifically in the /food/routers/edit-orders.php component. Published on 2026-03-02, it has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows arbitrary SQL query execution, potentially leading to unauthorized data access, modification, or deletion within the application's database.
The CVE references a GitHub bug report at https://github.com/Thirtypenny77/bug_report/blob/main/code-projects/simple-food-order-system/SQL-3.md, which documents the issue but does not specify patches or mitigations in the provided details.
Details
- CWE(s)