Description
A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file /update_sales.php of the component HTTP GET Parameter Handler. The manipulation of the argument sid results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Published: 2026-03-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in SourceCodester Sales and Inventory System 1.0 allows an attacker to manipulate the sid parameter in the update_sales.php handler. This results in unsanitized input being incorporated into an SQL query, enabling arbitrary SQL injection. An attacker can execute malicious SQL statements over the network, potentially reading, modifying, or deleting data in the underlying database.

Affected Systems

The affected product is SourceCodester Sales and Inventory System version 1.0, deployed via the update_sales.php script. The issue resides in the component handling HTTP GET parameters.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation. However, the vulnerability can be triggered remotely, and a public exploit exists, raising the risk for systems still running the vulnerable version. Without an official vendor fix or workaround, attackers who discover this flaw can compromise the database directly by sending crafted GET requests to the update_sales.php endpoint.

Generated by OpenCVE AI on April 8, 2026 at 20:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the installed version of SourceCodester Sales and Inventory System—if it is 1.0, consider upgrading or applying a vendor patch once available.
  • If upgrading is not immediately possible, restrict remote access to the update_sales.php endpoint by using firewall rules or web‑application firewall constraints.
  • Implement input validation for the sid parameter, allowing only integer values and rejecting any non‑numeric input before it reaches the database layer.
  • Replace the vulnerable query construction with parameterized queries or prepared statements to prevent SQL injection.
  • Audit database logs and monitor for unusual query activity that may indicate exploitation attempts.

Generated by OpenCVE AI on April 8, 2026 at 20:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPEs cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
Vendors & Products Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System

Thu, 26 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester sales And Inventory System
Vendors & Products Sourcecodester
Sourcecodester sales And Inventory System

Wed, 25 Mar 2026 22:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file /update_sales.php of the component HTTP GET Parameter Handler. The manipulation of the argument sid results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
Title SourceCodester Sales and Inventory System HTTP GET Parameter update_sales.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ahsanriaz26gmailcom Sales And Inventory System
Sourcecodester Sales And Inventory System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T17:52:53.821Z

Reserved: 2026-03-25T14:04:28.460Z

Link: CVE-2026-4825

cve-icon Vulnrichment

Updated: 2026-03-26T17:52:50.313Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T23:17:10.817

Modified: 2026-04-08T18:40:26.427

Link: CVE-2026-4825

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:04:41Z

Weaknesses