Description
A vulnerability was identified in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file /product_expiry/edit-admin.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw resides in edit-admin.php of SourceCodester Web-based Pharmacy Product Management System 1.0. By manipulating the ID argument, an attacker can inject arbitrary SQL statements into the query that retrieves product expiry data. This vulnerability enables attackers to read, modify or delete database records through HTTP requests. The intrusion occurs remotely, requiring no local access; consequences include data exfiltration, integrity compromise, and potential financial loss.

Affected Systems

SourceCodester Web-based Pharmacy Product Management System version 1.0 is affected. The vulnerability exists in the edit-admin.php component of the product.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, with remote exploitation possible via HTTP requests. The EPSS score is not available, but the publicly available exploit suggests it is a known vulnerability that attackers could use. The vulnerability is not listed in CISA KEV, so it has not yet been confirmed as exploited in the wild at this time. Attackers could craft malicious requests targeting the ID parameter to inject SQL, potentially gaining unauthorized database access. The lack of detailed privilege escalation hints that the impact is limited to the application’s database credentials, but any data manipulation could have significant ramifications.

Generated by OpenCVE AI on May 4, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch or upgrade to a newer version that addresses the SQL injection in edit‑admin.php.
  • Implement parameterized queries or proper input sanitization for all database operations involving the ID parameter.
  • Restrict access to edit‑admin.php so that only authenticated administrators can invoke it, and enforce strict role‑based access controls.

Generated by OpenCVE AI on May 4, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Sourcecodester
Sourcecodester web-based Pharmacy Product Management System
Vendors & Products Sourcecodester
Sourcecodester web-based Pharmacy Product Management System

Mon, 04 May 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file /product_expiry/edit-admin.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
Title SourceCodester Web-based Pharmacy Product Management System edit-admin.php sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Sourcecodester Web-based Pharmacy Product Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T08:00:13.659Z

Reserved: 2026-05-03T17:18:58.177Z

Link: CVE-2026-7746

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-04T09:16:00.953

Modified: 2026-05-04T15:17:58.710

Link: CVE-2026-7746

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T10:00:09Z

Weaknesses