Description
A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
Published: 2026-03-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Sales and Inventory System 1.0 allows an attacker to inject arbitrary SQL through the sid parameter of update_purchase.php. The vulnerability arises from unsanitized input handling (CWE-74 and CWE-89), enabling attackers to read, modify, or delete data in the underlying database. The impact is loss of data confidentiality and integrity and it could potentially be leveraged for broader exploitation.

Affected Systems

SourceCodester: Sales and Inventory System version 1.0 is affected. The issue resides in the HTTP GET parameter handler of update_purchase.php, which accepts the sid argument without proper validation.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity of risk. The EPSS score is reported to be less than 1%, suggesting a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, but an exploit has been published, and the attack can be performed remotely by sending a crafted GET request to the sid parameter.

Generated by OpenCVE AI on April 7, 2026 at 22:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check SourceCodester for an update or security patch for Sales and Inventory System 1.0 and install it immediately.
  • If no patch is available, modify the update_purchase.php script to enforce strict validation on the sid parameter, allowing only numeric IDs and using prepared statements.
  • Implement a web application firewall rule to detect and block SQL injection patterns targeting the sid parameter.

Generated by OpenCVE AI on April 7, 2026 at 22:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Tue, 24 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
Title SourceCodester Sales and Inventory System HTTP GET Parameter update_purchase.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-25T14:27:00.267Z

Reserved: 2026-03-24T15:11:42.411Z

Link: CVE-2026-4781

cve-icon Vulnrichment

Updated: 2026-03-25T14:25:02.654Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T00:16:41.327

Modified: 2026-04-07T18:23:31.827

Link: CVE-2026-4781

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:01:17Z

Weaknesses