Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 23 Feb 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:projectworlds:online_food_ordering_system:*:*:*:*:*:*:*:* |
Wed, 11 Feb 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:projectworlds:online_food_ordering_system:1.0:*:*:*:*:*:*:* |
Tue, 10 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Projectworlds
Projectworlds online Food Ordering System |
|
| Vendors & Products |
Projectworlds
Projectworlds online Food Ordering System |
Sun, 08 Feb 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in projectworlds Online Food Ordering System 1.0. This affects an unknown function of the file /view-ticket.php. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been published and may be used. | |
| Title | projectworlds Online Food Ordering System view-ticket.php sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T09:38:18.396Z
Reserved: 2026-02-06T20:59:35.229Z
Link: CVE-2026-2136
Updated: 2026-02-10T19:51:24.758Z
Status : Analyzed
Published: 2026-02-08T06:16:16.313
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-2136
No data.
OpenCVE Enrichment
Updated: 2026-04-18T18:30:07Z