Impact
The vulnerability exists in the update_category.php file of the SourceCodester Sales and Inventory System, where the sid GET parameter is not properly sanitized, allowing a remote attacker to inject arbitrary SQL statements. This can enable unauthorized reading, modification, or deletion of inventory data, resulting in loss of confidentiality and integrity of the business database. The weakness can be mapped to improper handling of HTTP GET parameters (CWE‑74) and dynamic SQL construction (CWE‑89).
Affected Systems
The affected product is SourceCodester Sales and Inventory System version 1.0. The flaw resides in the update_category.php component and is documented for the specific 1.0 release. No other releases are listed as vulnerable in the provided CVE data.
Risk and Exploitability
The CVSS score of 5.3 classifies the issue as medium severity, while an EPSS score of less than 1% indicates a low probability of automated exploitation. The vulnerability is not listed in the CISA KEV catalog, suggesting no widespread exploitation has been observed to date. Based on the description, the attack vector is remote via an HTTP GET request manipulating the sid parameter, making the flaw exploitable over the network.
OpenCVE Enrichment