Description
A weakness has been identified in SourceCodester Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file /view_product.php of the component HTTP POST Request Handler. Executing a manipulation of the argument searchtxt can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Published: 2026-03-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Patch Now
AI Analysis

Impact

The vulnerability is a SQL injection flaw located in the view_product.php script of SourceCodester Sales and Inventory System 1.0. By manipulating the searchtxt argument in an HTTP POST request, an attacker can inject arbitrary SQL statements, potentially allowing unauthorized reading or alteration of the underlying database and exposing sensitive inventory data.

Affected Systems

The flaw is present in all deployments of SourceCodester Sales and Inventory System version 1.0. Any installation that has not yet applied a fix or upgrade is susceptible, as the vulnerability resides in the HTTP POST request handler of the view_product.php file.

Risk and Exploitability

The CVSS score is 5.3, representing moderate severity, while an EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is publicly documented and can be triggered remotely via a crafted POST request to the searchtxt parameter. Although it is not listed in the CISA KEV catalog, administrators should treat it as a valid security concern and address it promptly.

Generated by OpenCVE AI on April 10, 2026 at 03:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the SourceCodester website or contact the vendor for a patch or newer release that fixes the SQL injection flaw.
  • Apply the vendor-supplied patch or upgrade to the latest version of the system.
  • If no patch is available, modify the view_product.php script to validate and sanitize the searchtxt input and use parameterized queries.
  • Ensure the database account used by the application has only the permissions necessary for its functions.
  • Monitor application logs for unusual SQL activity that may indicate exploitation attempts.

Generated by OpenCVE AI on April 10, 2026 at 03:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Mon, 23 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Mon, 23 Mar 2026 05:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in SourceCodester Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file /view_product.php of the component HTTP POST Request Handler. Executing a manipulation of the argument searchtxt can lead to sql injection. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.
Title SourceCodester Sales and Inventory System HTTP POST Request view_product.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T11:47:18.806Z

Reserved: 2026-03-22T08:42:47.261Z

Link: CVE-2026-4572

cve-icon Vulnrichment

Updated: 2026-03-23T11:47:12.335Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-23T05:16:07.437

Modified: 2026-04-10T01:04:50.290

Link: CVE-2026-4572

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:46:18Z

Weaknesses