Description
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_stock.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL.
Published: 2026-03-30
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Script Execution via XSS
Action: Apply patch
AI Analysis

Impact

A reflected Cross‑Site Scripting flaw exists in the SourceCodester Sales and Inventory System 1.0. The flaw is triggered through the uncensored 'msg' parameter in add_stock.php, enabling a remote attacker to embed arbitrary JavaScript or HTML into the page. An exploited victim’s browser would execute the injected code, allowing session hijacking, data theft, or site defacement.

Affected Systems

SourceCodester Sales and Inventory System version 1.0 is affected. The vulnerability is located in the add_stock.php module that accepts a 'msg' query string.

Risk and Exploitability

The CVSS score of 9.3 reflects a high risk; the EPSS score is below 1% and the flaw is not yet listed in the KEV catalog. Exploitation requires an attacker to craft a malicious URL that includes the injected payload in the 'msg' parameter and deliver it to a victim who visits the link. No authentication or privileged access is needed to trigger the flaw.

Generated by OpenCVE AI on April 2, 2026 at 03:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated release of the SourceCodester Sales and Inventory System that removes the unsanitized 'msg' parameter handling.
  • If a patch is not available, modify the add_stock.php code to validate or encode input from the 'msg' parameter before rendering it in the response.
  • Implement a web application firewall or content security policy to block execution of injected scripts.
  • Monitor logs for suspicious 'msg' parameter usage and restrict access to the add_stock.php endpoint if possible.

Generated by OpenCVE AI on April 2, 2026 at 03:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS via msg Parameter in SourceCodester Sales and Inventory System

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Reflected XSS via msg Parameter in SourceCodester Sales and Inventory System

Mon, 30 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the add_stock.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL.
References

Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T18:13:15.980Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30562

cve-icon Vulnrichment

Updated: 2026-03-30T18:13:00.510Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T16:16:05.840

Modified: 2026-04-01T16:23:40.620

Link: CVE-2026-30562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:55:02Z

Weaknesses