CVE-2026-4472
Published: 20 March 2026
Summary
CVE-2026-4472 is a medium-severity Injection (CWE-74) vulnerability in Adonesevangelista Online Frozen Foods Ordering System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires input validation and error handling at entry points like the Supplier_Name parameter to block SQL injection exploitation.
Mandates timely identification, reporting, and remediation of the SQL injection flaw in /admin/admin_edit_supplier.php.
Boundary protection with web application firewalls inspects and blocks remote SQL injection payloads targeting the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection vulnerability in a remotely accessible web application (online ordering system) directly enables exploitation of a public-facing application for limited data access/modification.
NVD Description
A security vulnerability has been detected in itsourcecode Online Frozen Foods Ordering System 1.0. This vulnerability affects unknown code of the file /admin/admin_edit_supplier.php. The manipulation of the argument Supplier_Name leads to sql injection. The attack can be initiated remotely. The…
more
exploit has been disclosed publicly and may be used.
Deeper analysisAI
CVE-2026-4472 is a SQL injection vulnerability (CWE-74, CWE-89) in the itsourcecode Online Frozen Foods Ordering System version 1.0. The issue resides in unknown code within the file /admin/admin_edit_supplier.php, where manipulation of the Supplier_Name argument enables the injection.
The vulnerability carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and can be exploited remotely by an attacker possessing low privileges. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, such as partial unauthorized access, modification, or disruption of data.
VulDB advisories (ctiid.351762, id.351762, submit.775207) document the vulnerability, while a proof-of-concept exploit is publicly disclosed in a GitHub issue at https://github.com/rockycheng1/cve/issues/1. The project's source is hosted at https://itsourcecode.com/, but no specific patches or mitigations are detailed in the available information.
The exploit has been publicly disclosed and may be used, indicating potential for active exploitation.
Details
- CWE(s)