CVE-2026-5019
Published: 29 March 2026
Summary
CVE-2026-5019 is a high-severity Injection (CWE-74) vulnerability in Carmelo Simple Food Order System. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation directly patches the SQL injection vulnerability in all-orders.php's Parameter Handler for CVE-2026-5019.
Information input validation mechanisms prevent manipulation of the Status parameter to block SQL injection in CVE-2026-5019.
Vulnerability scanning detects the SQL injection flaw in Simple Food Order System 1.0, enabling remediation of CVE-2026-5019.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated SQL injection in a public-facing web app (all-orders.php Status param) directly enables remote exploitation of internet-facing applications per T1190.
NVD Description
A security vulnerability has been detected in code-projects Simple Food Order System 1.0. Affected by this vulnerability is an unknown functionality of the file all-orders.php of the component Parameter Handler. The manipulation of the argument Status leads to sql injection.…
more
The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.
Deeper analysisAI
CVE-2026-5019 is a SQL injection vulnerability affecting code-projects Simple Food Order System 1.0. The issue resides in an unknown functionality of the file all-orders.php within the Parameter Handler component, where manipulation of the Status argument triggers the injection. Published on 2026-03-29, it is classified under CWE-74 and CWE-89 with a CVSS 3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L).
Unauthenticated remote attackers can exploit this vulnerability with low attack complexity and no user interaction required. By manipulating the Status parameter, attackers can execute arbitrary SQL queries, potentially leading to low-level impacts on confidentiality, integrity, and availability of the affected system.
Advisories and further details are available via references including the project site at https://code-projects.org/, a GitHub issue at https://github.com/6Justdododo6/CVE/issues/17, and VulDB entries at https://vuldb.com/submit/779341, https://vuldb.com/vuln/353904, and https://vuldb.com/vuln/353904/cti. The exploit has been publicly disclosed and may be used.
Details
- CWE(s)