Impact
A reflected cross‑site scripting flaw exists in the add_sales.php module of SourceCodester Sales and Inventory System 1.0. The application echoes the value of the msg query string directly in the generated page, so an attacker can embed JavaScript or other HTML. This flaw can be used to steal credentials, deface pages, or conduct phishing attacks against other users, damaging confidentiality and integrity of user data.
Affected Systems
Only the 1.0 release of SourceCodester Sales and Inventory System is affected. No other versions or vendors have been reported to contain the flaw. The vulnerability resides in the publicly accessible web interface of the application.
Risk and Exploitability
The base CVSS score of 6.1 indicates a medium severity vulnerability, and the EPSS score of less than 1 % suggests that widespread exploitation is currently unlikely. The flaw is not listed in the CISA KEV catalog. Attackers can launch the exploit remotely by sending a crafted GET request to add_sales.php without authentication, making it trivial for anyone who can reach the application URL.
OpenCVE Enrichment