CVE-2026-26713
Published: 02 March 2026
Summary
CVE-2026-26713 is a critical-severity SQL Injection (CWE-89) vulnerability in Carmelo Simple Food Order System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 15.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SQL injection in cancel-order.php by requiring validation of untrusted user inputs before constructing database queries.
Ensures timely identification, reporting, and correction of the specific SQL injection flaw documented in CVE-2026-26713.
Provides vulnerability scanning to identify SQL injection vulnerabilities like CVE-2026-26713 in web applications.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing PHP web app directly enables T1190 for initial access; arbitrary queries facilitate DB data collection (T1213.006), stored data manipulation (T1565.001), and destruction (T1485).
NVD Description
code-projects Simple Food Order System v1.0 is vulnerable to SQL Injection in /food/routers/cancel-order.php.
Deeper analysisAI
CVE-2026-26713 is a SQL injection vulnerability (CWE-89) affecting code-projects Simple Food Order System version 1.0, specifically in the /food/routers/cancel-order.php component. Published on 2026-03-02, it has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact exploitation.
Remote attackers require no privileges, authentication, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation allows arbitrary SQL query execution, enabling attackers to achieve high confidentiality, integrity, and availability impacts, such as data exfiltration, modification, or deletion from the underlying database.
The primary advisory reference is available at https://github.com/Thirtypenny77/bug_report/blob/main/code-projects/simple-food-order-system/SQL-4.md, which documents the vulnerability discovery but does not specify patches or detailed mitigation steps in the provided information.
Details
- CWE(s)