Description
A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown function of the file /add_stock.php. Performing a manipulation of the argument cost results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to potential data disclosure or modification
Action: Patch Now
AI Analysis

Impact

A flaw in the add_stock.php component of SourceCodester Sales and Inventory System version 1.0 allows an attacker to inject arbitrary SQL via the unvalidated cost parameter. The injection can alter queries sent to the underlying database, enabling data retrieval, modification, or even deletion. The vulnerability is classified as CWE‑74 and CWE‑89, underscoring both unsanitized input handling and direct user input in SQL statements.

Affected Systems

The affected product is SourceCodester Sales and Inventory System, version 1.0, distributed by SourceCodester.

Risk and Exploitability

The common vulnerability scoring system rates the issue at a CVSS score of 5.3, reflecting moderate severity. The exploit prediction score is less than 1%, indicating a low probability of widespread exploitation at this time, and the flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. The description states that the attack can be initiated remotely, implying that an unauthenticated or low‑privileged attacker could send crafted requests to the web application to trigger the injection.

Generated by OpenCVE AI on April 16, 2026 at 04:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a vendor‑issued patch or upgrade to a patched version of SourceCodester Sales and Inventory System once available.
  • Refactor the cost parameter handling to use prepared statements or parameterized queries, eliminating direct inclusion of user input in SQL commands.
  • Restrict the database account used by the application to the minimum permissions required, preventing the alteration of critical tables if injection succeeds.

Generated by OpenCVE AI on April 16, 2026 at 04:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Sun, 08 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown function of the file /add_stock.php. Performing a manipulation of the argument cost results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.
Title SourceCodester Sales and Inventory System add_stock.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:30:19.582Z

Reserved: 2026-03-07T20:29:57.466Z

Link: CVE-2026-3754

cve-icon Vulnrichment

Updated: 2026-03-11T19:30:15.497Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T18:15:49.340

Modified: 2026-03-09T15:17:10.710

Link: CVE-2026-3754

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T04:15:24Z

Weaknesses