CVE-2026-5255
Received Received - Intake
Cross-Site Scripting in Simple Laundry System Parameter Handler

Publication date: 2026-04-01

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in code-projects Simple Laundry System 1.0. This affects an unknown part of the file /delstaffinfo.php of the component Parameter Handler. The manipulation of the argument userid results in cross site scripting. The attack may be launched remotely. The exploit is now public and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects simple_laundry_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5255 is a Cross-Site Scripting (XSS) vulnerability found in version 1.0 of the Simple Laundry System, specifically in the /delstaffinfo.php file. The issue arises because the 'userid' parameter is not properly handled, allowing attackers to inject malicious JavaScript code that gets executed in the victim's browser.

This happens because user input is directly reflected in the web page output without adequate encoding or filtering, enabling attackers to run arbitrary scripts.

Exploitation does not require the attacker to be authenticated, and a proof-of-concept payload can be injected via the URL parameter to demonstrate the vulnerability.


How can this vulnerability impact me? :

This vulnerability can have several impacts including:

  • Attackers can steal cookies, session tokens, or other sensitive information.
  • Attackers can execute unauthorized actions on behalf of the victim.
  • Web pages can be defaced or users redirected to malicious sites.
  • Attackers may gain control over the victim's browser.

Because the attack can be launched remotely without authentication, it poses a significant security risk.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the 'userid' parameter in the /delstaffinfo.php page for cross-site scripting (XSS) issues. A common method is to inject a simple script payload into the URL and observe if it executes in the browser.

  • Use a browser or a tool like curl to send a request with a script payload, for example: http://127.0.0.1/Laundry_system/delstaffinfo.php?userid=<script>prompt(/xss/);</script>
  • Command example using curl to test the vulnerability: curl -i "http://127.0.0.1/Laundry_system/delstaffinfo.php?userid=%3Cscript%3Eprompt(/xss/);%3C/script%3E"

If the response contains the injected script without proper encoding or filtering, the system is vulnerable to XSS.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing proper output encoding and input validation to prevent execution of injected scripts.

  • Apply output encoding on the 'userid' parameter based on the context (HTML, JavaScript, CSS, URL) to ensure user input is treated as text.
  • Enforce strict input validation and filtering to allow only expected formats and reject or escape malicious content such as script tags.
  • Implement a strict Content Security Policy (CSP) to restrict sources of executable scripts and prevent unauthorized script execution.
  • Set HttpOnly and Secure flags on cookies to protect sensitive information from being accessed via JavaScript and ensure secure transmission.
  • Conduct regular security audits and code reviews to detect and remediate XSS and other vulnerabilities promptly.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The cross-site scripting (XSS) vulnerability in the Simple Laundry System allows attackers to execute arbitrary scripts in users' browsers, potentially leading to unauthorized access to sensitive information such as cookies and session tokens.

Such unauthorized access and potential data breaches can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and disclosure.

Failure to remediate this vulnerability could result in violations of these regulations due to inadequate protection of user data, leading to legal and financial consequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart