Description
A vulnerability was detected in opensourcepos Open Source Point of Sale up to 3.4.2. This issue affects the function getPicThumb of the file app/Controllers/Items.php. The manipulation of the argument pic_filename results in path traversal. The attack may be launched remotely. The patch is identified as def0c27a0e252668df8d942fc31e16d1edfd7323. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure.
Published: 2026-05-18
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A path traversal flaw exists in the getPicThumb function of the Items controller, where the pic_filename argument is improperly validated. An attacker can supply a crafted filename, causing the application to resolve directories outside its intended scope and potentially read any accessible file on the server. The issue is remotely exploitable and could disclose sensitive data, such as configuration files or stored credentials.

Affected Systems

The vulnerability affects Open Source Point of Sale, versions up to 3.4.2 provided by opensourcepos. A fix was issued in commit def0c27a0e252668df8d942fc31e16d1edfd7323 and should be applied to upgrade to a patched release.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Based on the description, the attack vector is remote and requires no authentication; once the attacker delivers a request with a crafted pic_filename, they can read arbitrary files within the server’s accessible filesystem. Compliance with the CWE-22 weakness suggests that once applied, the risk is mitigated but residual exposure exists if the application is accessible to untrusted users.

Generated by OpenCVE AI on May 18, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch identified by commit def0c27a0e252668df8d942fc31e16d1edfd7323 or upgrade to a version newer than 3.4.2
  • Restrict access to the Items controller or remove its remote availability to reduce the attack surface
  • Implement input validation for pic_filename to allow only filenames without directory separators and reject or normalize any traversal sequences

Generated by OpenCVE AI on May 18, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in opensourcepos Open Source Point of Sale up to 3.4.2. This issue affects the function getPicThumb of the file app/Controllers/Items.php. The manipulation of the argument pic_filename results in path traversal. The attack may be launched remotely. The patch is identified as def0c27a0e252668df8d942fc31e16d1edfd7323. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure.
Title opensourcepos Open Source Point of Sale Items.php getPicThumb path traversal
First Time appeared Opensourcepos
Opensourcepos open Source Point Of Sale
Weaknesses CWE-22
CPEs cpe:2.3:a:opensourcepos:open_source_point_of_sale:*:*:*:*:*:*:*:*
Vendors & Products Opensourcepos
Opensourcepos open Source Point Of Sale
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X'}


Subscriptions

Opensourcepos Open Source Point Of Sale
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-18T10:00:14.027Z

Reserved: 2026-05-18T04:37:48.556Z

Link: CVE-2026-8802

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T11:16:18.623

Modified: 2026-05-18T11:16:18.623

Link: CVE-2026-8802

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T11:30:24Z

Weaknesses