Description
A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file view_supplier.php of the component POST Parameter Handler. The manipulation of the argument searchtxt results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-03-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection leading to potential data exposure or modification
Action: Immediate Patch
AI Analysis

Impact

The flaw resides in the view_supplier.php component, where the POST parameter searchtxt is improperly sanitized, allowing an attacker to inject SQL code. This vulnerability can be exploited from a remote location and may be used to read, modify, or delete data stored in the application’s database, compromising the confidentiality, integrity, and availability of sensitive business information.

Affected Systems

The affected product is SourceCodester Sales and Inventory System version 1.0, distributed by SourceCodester.

Risk and Exploitability

With a CVSS score of 5.3 the risk is moderate, and the EPSS score indicates low current exploitation probability (<1%). The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is a remote POST request to view_supplier.php using the searchtxt parameter, and the exploit has been made publicly available.

Generated by OpenCVE AI on April 8, 2026 at 20:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Contact SourceCodester for a patched version of Sales and Inventory System 1.0
  • If no patch is immediately available, isolate the application from the internet or restrict access to trusted users only
  • Immediately sanitize or whitelist the searchtxt input using prepared statements or parameterized queries
  • Apply a web application firewall rule to block anomalous POST payloads targeting view_supplier.php
  • Regularly review application logs for suspicious query patterns and conduct penetration testing

Generated by OpenCVE AI on April 8, 2026 at 20:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Wed, 25 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Tue, 24 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file view_supplier.php of the component POST Parameter Handler. The manipulation of the argument searchtxt results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks.
Title SourceCodester Sales and Inventory System POST Parameter view_supplier.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T19:41:41.368Z

Reserved: 2026-03-24T15:11:23.688Z

Link: CVE-2026-4777

cve-icon Vulnrichment

Updated: 2026-03-25T19:41:37.845Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T22:16:24.187

Modified: 2026-04-08T18:53:40.770

Link: CVE-2026-4777

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:34Z

Weaknesses