CVE-2026-2865

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute malicious SQL commands on the Agri-Trading Online Shopping System, potentially giving them access to sensitive data or the ability to manipulate the database. The attack can be carried out remotely by sending specially crafted requests to the system without needing any special access or credentials.

Technical Description

A vulnerability was found in itsourcecode Agri-Trading Online Shopping System 1.0. This impacts an unknown function of the file admin/productcontroller.php of the component HTTP POST Request Handler. Performing a manipulation of the argument Product results in sql injection. The attack may be initiated remotely. The exploit has been made public and could be used.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,000($500-$1K)
Vendor Response
Grade APatched in 4 days

Quick Information

Published

Feb 21, 2026

about 2 months ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

adonesevangelista

Product

agri-trading online shopping system