Impact
An HTTP POST request to the /view_category.php endpoint in SourceCodester Sales and Inventory System allows attackers to manipulate the searchtxt argument, enabling injection of arbitrary SQL statements. This flaw can expose sensitive database content and grant an attacker unauthorized data modification, thereby compromising the confidentiality and integrity of the system.
Affected Systems
The vulnerability affects SourceCodester Sales and Inventory System version 1.0. No other versions or product variants are listed as impacted.
Risk and Exploitability
The CVSS base score of 5.3 indicates a moderate impact, while an EPSS score below 1 % suggests low automated exploitation probability. The issue is not included in the CISA KEV catalog. Attackers would need to craft a POST request to /view_category.php, supplying a malicious value for searchtxt. Although no public exploit code is available, the injection path is straightforward for anyone able to submit data to the vulnerable endpoint.
OpenCVE Enrichment