Description
A security flaw has been discovered in SourceCodester Pharmacy Product Management System 1.0. This affects an unknown part of the file add-sales.php of the component POST Parameter Handler. Performing a manipulation of the argument txtqty results in business logic errors. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Published: 2026-04-08
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: Business Logic Manipulation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the add‑sales.php component of SourceCodester Pharmacy Product Management System 1.0. An attacker can manipulate the posted txtqty parameter, submitting values such as negative numbers. The component then processes these inputs without proper validation, leading to unintended sales records that distort inventory counts and financial calculations. This flaw undermines the integrity of transaction data and can result in incorrect accounting or stock shortages.

Affected Systems

The flaw affects the Pharmacy Product Management System version 1.0 supplied by SourceCodester. Systems running this edition are typically found in small pharmacy or retail environments and may not have hardened input handling. No other version numbers are indicated in the vulnerability report.

Risk and Exploitability

The vulnerability has a moderate severity rating with a base score of 5.3. No exploitation probability data is available, and the issue has not been identified as a known exploited vulnerability. Attackers can carry out the exploit remotely by sending crafted HTTP POST requests to the vulnerable add‑sales.php endpoint; this inference is drawn from the description that the attack can be initiated from a remote location.

Generated by OpenCVE AI on April 9, 2026 at 00:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade the Pharmacy Product Management System to the latest available version.
  • If no patch exists, modify add‑sales.php to validate the txtqty parameter so that only positive integers are accepted and reject negative or non‑numeric input.
  • Implement comprehensive input validation and sanitization for all POST parameters that influence sales logic.
  • Restrict access to add‑sales.php by enforcing authentication checks or applying IP‑based filtering to limit usage to authorized personnel.
  • Continuously monitor sales logs for abnormal transaction counts or negative quantities and investigate any anomalies promptly.

Generated by OpenCVE AI on April 9, 2026 at 00:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester web-based Pharmacy Product Management System
Vendors & Products Sourcecodester
Sourcecodester web-based Pharmacy Product Management System

Wed, 08 Apr 2026 22:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in SourceCodester Pharmacy Product Management System 1.0. This affects an unknown part of the file add-sales.php of the component POST Parameter Handler. Performing a manipulation of the argument txtqty results in business logic errors. It is possible to initiate the attack remotely. The exploit has been released to the public and may be used for attacks.
Title SourceCodester Pharmacy Product Management System POST Parameter add-sales.php logic error
Weaknesses CWE-840
References
Metrics cvssV2_0

{'score': 5.5, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Web-based Pharmacy Product Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-08T22:30:15.161Z

Reserved: 2026-04-08T15:22:07.921Z

Link: CVE-2026-5812

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-08T23:17:00.620

Modified: 2026-04-08T23:17:00.620

Link: CVE-2026-5812

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:25:31Z

Weaknesses