Description
A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
Published: 2026-03-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Apply Patch
AI Analysis

Impact

A flaw in the check_supplier_details.php handler of SourceCodester Sales and Inventory System 1.0 allows an attacker to inject arbitrary SQL statements through the stock_name1 POST parameter. This injection can compromise database confidentiality, integrity, and potentially availability by exfiltrating or altering records.

Affected Systems

The vulnerability affects the SourceCodester Sales and Inventory System version 1.0. No other releases are listed as affected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, while the EPSS score of less than 1% suggests a low probability of widespread exploitation. The vulnerability is not currently listed in CISA’s KEV catalog. However, the exploit is available in public sources and can be triggered remotely via HTTP POST to the vulnerable endpoint.

Generated by OpenCVE AI on April 16, 2026 at 10:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the SourceCodester Sales and Inventory System to the latest version or apply the vendor’s official patch if one becomes available
  • Refactor the stock_name1 input handling to use prepared statements or parameterized queries so that user data cannot alter SQL syntax
  • Implement input validation and sanitization that rejects any non‑alphanumeric characters or uses a whitelist of acceptable values for stock_name1

Generated by OpenCVE AI on April 16, 2026 at 10:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Mon, 09 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Mon, 09 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
Title SourceCodester Sales and Inventory System POST Parameter check_supplier_details.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T17:13:35.471Z

Reserved: 2026-03-08T07:23:54.048Z

Link: CVE-2026-3790

cve-icon Vulnrichment

Updated: 2026-03-10T17:13:29.704Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T00:16:01.723

Modified: 2026-03-09T15:04:42.643

Link: CVE-2026-3790

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:30:16Z

Weaknesses