CVE-2026-3753
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely manipulate a specific part of the sales and inventory system to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability affects versions up to 1.0 and requires the attacker to send specially crafted input to a specific file in the system.
Technical Description
A vulnerability has been found in SourceCodester Sales and Inventory System up to 1.0. The impacted element is an unknown function of the file /add_sales_print.php. Such manipulation of the argument sid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
ahsanriaz26gmailcom
Product
sales and inventory system
Related Vulnerabilities
An attacker can remotely manipulate the stock name in the Sales and Inventory System to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability affects versions up to 1.0 and can be exploited using publicly available methods.
An attacker can exploit a vulnerability in the sales and inventory system to manipulate database queries by sending specially crafted data through a specific web request, potentially allowing them to access or modify sensitive information. This attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk.
An attacker can remotely manipulate the cost argument in the sales and inventory system's add_stock.php file to execute unauthorized SQL commands, potentially gaining access to sensitive data or altering the database. This vulnerability can be exploited without needing any special access or credentials.