Cyber Posture

CVE-2026-4908

HighPublic PoC

Published: 27 March 2026

Published
27 March 2026
Modified
03 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0001 3.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4908 is a high-severity Injection (CWE-74) vulnerability in Code-Projects Simple Laundry System. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of inputs such as the 'userid' parameter to prevent SQL injection manipulation in /modstaffinfo.php.

prevent

SI-2 mandates timely identification, reporting, and correction of flaws like the SQL injection vulnerability in Simple Laundry System 1.0.

detect

RA-5 provides vulnerability scanning to identify SQL injection weaknesses such as CVE-2026-4908 prior to exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated remote SQL injection in a public-facing PHP web application (modstaffinfo.php) directly enables initial access via exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be…

more

performed from remote. The exploit has been released to the public and may be used for attacks.

Deeper analysisAI

CVE-2026-4908 is a SQL injection vulnerability (CWE-74, CWE-89) in code-projects Simple Laundry System 1.0, published on 2026-03-27. The flaw affects an unknown function in the file /modstaffinfo.php within the Parameter Handler component, where manipulation of the 'userid' argument enables the injection.

The vulnerability is remotely exploitable over the network with low attack complexity, requiring no privileges or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, base score 7.3). Unauthenticated attackers can achieve limited impacts on confidentiality, integrity, and availability. An exploit has been publicly released and may be used for attacks.

Advisories and details appear in VulDB entries (ctiid.353659, id.353659, submit.777501) and a GitHub issue at Niuzzz123/CVE-Niuzzz/issues/2, alongside the software page at code-projects.org. No specific patches or mitigations are detailed in the disclosure.

Details

CWE(s)

Affected Products

code-projects
simple laundry system
1.0

CVEs Like This One

CVE-2026-4784Same product: Code-Projects Simple Laundry System
CVE-2026-4581Same product: Code-Projects Simple Laundry System
CVE-2026-4850Same product: Code-Projects Simple Laundry System
CVE-2026-5257Same product: Code-Projects Simple Laundry System
CVE-2026-4579Same product: Code-Projects Simple Laundry System
CVE-2026-5256Same product: Code-Projects Simple Laundry System
CVE-2026-4580Same product: Code-Projects Simple Laundry System
CVE-2025-0208Same vendor: Code-Projects
CVE-2025-0299Same vendor: Code-Projects
CVE-2026-0546Same vendor: Code-Projects

References