CVE-2026-26711
Published: 02 March 2026
Summary
CVE-2026-26711 is a critical-severity SQL Injection (CWE-89) vulnerability in Carmelo Simple Food Order System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection in /food/view-ticket.php by requiring validation and sanitization of user inputs before incorporation into SQL queries.
SI-2 mandates timely identification, reporting, and correction of the SQL injection flaw in Simple Food Order System v1.0, eliminating the vulnerability through patching.
SC-7 supports web application firewalls or boundary protections to inspect and block malicious SQL payloads targeting the vulnerable /food/view-ticket.php endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in unauthenticated public-facing web app component directly enables remote exploitation of the application and underlying database per T1190.
NVD Description
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/view-ticket.php.
Deeper analysisAI
CVE-2026-26711 is a SQL injection vulnerability (CWE-89) in code-projects Simple Food Order System v1.0, specifically affecting the /food/view-ticket.php component. Published on 2026-03-02T19:16:33.600, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for severe impacts across confidentiality, integrity, and availability.
The vulnerability can be exploited by unauthenticated remote attackers over the network with low attack complexity and no user interaction required. Exploitation enables arbitrary SQL query execution, allowing attackers to achieve high-level compromise of the underlying database, including data extraction, modification, or deletion.
Mitigation details are available in the referenced advisory at https://github.com/Thirtypenny77/bug_report/blob/main/code-projects/simple-food-order-system/SQL-2.md.
Details
- CWE(s)