CVE-2026-4908
Published: 27 March 2026
Summary
CVE-2026-4908 is a high-severity Injection (CWE-74) vulnerability in Code-Projects Simple Laundry System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 3.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 requires validation of inputs such as the 'userid' parameter to prevent SQL injection manipulation in /modstaffinfo.php.
SI-2 mandates timely identification, reporting, and correction of flaws like the SQL injection vulnerability in Simple Laundry System 1.0.
RA-5 provides vulnerability scanning to identify SQL injection weaknesses such as CVE-2026-4908 prior to exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote SQL injection in a public-facing PHP web application (modstaffinfo.php) directly enables initial access via exploitation of a public-facing application.
NVD Description
A security flaw has been discovered in code-projects Simple Laundry System 1.0. This affects an unknown function of the file /modstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in sql injection. The attack may be…
more
performed from remote. The exploit has been released to the public and may be used for attacks.
Deeper analysisAI
CVE-2026-4908 is a SQL injection vulnerability (CWE-74, CWE-89) in code-projects Simple Laundry System 1.0, published on 2026-03-27. The flaw affects an unknown function in the file /modstaffinfo.php within the Parameter Handler component, where manipulation of the 'userid' argument enables the injection.
The vulnerability is remotely exploitable over the network with low attack complexity, requiring no privileges or user interaction (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, base score 7.3). Unauthenticated attackers can achieve limited impacts on confidentiality, integrity, and availability. An exploit has been publicly released and may be used for attacks.
Advisories and details appear in VulDB entries (ctiid.353659, id.353659, submit.777501) and a GitHub issue at Niuzzz123/CVE-Niuzzz/issues/2, alongside the software page at code-projects.org. No specific patches or mitigations are detailed in the disclosure.
Details
- CWE(s)