Description
A vulnerability was found in SourceCodester E-Commerce Site 1.0. This vulnerability affects unknown code of the file /products.php. The manipulation of the argument Search results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
Published: 2026-03-23
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Assess Impact
AI Analysis

Impact

A vulnerability exists in the SourceCodester E-Commerce Site 1.0 within the products.php script. Malicious actors can supply an arbitrary search query through the Search parameter, which is inserted directly into a SQL statement without proper sanitization. This flaw can lead to remote SQL injection, allowing attackers to extract, modify, or delete data stored in the underlying database. The weakness corresponds to CWE-74 and CWE-89 vulnerabilities.

Affected Systems

Systems affected are installations of SourceCodester E-Commerce Site version 1.0 running the products.php module. The vulnerability is located in unknown or undocumented code that processes the Search argument. Administrators of web applications built on this platform should verify that the specific file is present and check whether the version has been patched by the vendor.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the KEV catalog, but an exploit is publicly documented. The attack can be conducted remotely by issuing HTTP requests to products.php with a crafted Search value. Operators should therefore treat this flaw as a realistic threat until a vendor patch becomes available.

Generated by OpenCVE AI on March 24, 2026 at 03:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any SourceCodester E-Commerce Site 1.0 security patches or updates.
  • If no patch is available, update the application to the latest supported version from the vendor.
  • Ensure that the Search parameter in products.php is validated and sanitized, preferably using parameterized queries.
  • Implement web application firewall rules to detect and block suspicious SQL injection attempts against products.php.
  • Monitor web server and database logs for unusual query patterns or authentication failures.

Generated by OpenCVE AI on March 24, 2026 at 03:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester ecommerce System
Vendors & Products Sourcecodester
Sourcecodester ecommerce System

Tue, 24 Mar 2026 02:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester E-Commerce Site 1.0. This vulnerability affects unknown code of the file /products.php. The manipulation of the argument Search results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used.
Title SourceCodester E-Commerce Site products.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Ecommerce System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-24T15:12:55.726Z

Reserved: 2026-03-23T05:47:45.539Z

Link: CVE-2026-4613

cve-icon Vulnrichment

Updated: 2026-03-24T14:16:08.350Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T00:16:31.587

Modified: 2026-03-24T15:53:48.067

Link: CVE-2026-4613

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:36:08Z

Weaknesses