Impact
A flaw in the Sales and Inventory System 1.0 allows an attacker to inject arbitrary SQL through the sid parameter of update_purchase.php. The vulnerability arises from unsanitized input handling (CWE-74 and CWE-89), enabling attackers to read, modify, or delete data in the underlying database. The impact is loss of data confidentiality and integrity and it could potentially be leveraged for broader exploitation.
Affected Systems
SourceCodester: Sales and Inventory System version 1.0 is affected. The issue resides in the HTTP GET parameter handler of update_purchase.php, which accepts the sid argument without proper validation.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity of risk. The EPSS score is reported to be less than 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, but an exploit has been published, and the attack can be performed remotely by sending a crafted GET request to the sid parameter.
OpenCVE Enrichment