CVE-2026-3756
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely manipulate the stock name in the Sales and Inventory System to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability affects versions up to 1.0 and can be exploited using publicly available methods.
Technical Description
A vulnerability was identified in SourceCodester Sales and Inventory System up to 1.0. Affected is an unknown function of the file /check_item_details.php. The manipulation of the argument stock_name1 leads to sql injection. The attack may be initiated remotely. The exploit is publicly available and might be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
30 days ago
Last Modified
Mar 9, 2026
29 days ago
Vendor
ahsanriaz26gmailcom
Product
sales and inventory system
Related Vulnerabilities
An attacker can exploit a vulnerability in the sales and inventory system to manipulate database queries by sending specially crafted data through a specific web request, potentially allowing them to access or modify sensitive information. This attack can be carried out remotely, meaning the attacker doesn't need physical access to the system, making it a significant risk.
An attacker can remotely manipulate the cost argument in the sales and inventory system's add_stock.php file to execute unauthorized SQL commands, potentially gaining access to sensitive data or altering the database. This vulnerability can be exploited without needing any special access or credentials.
An attacker can remotely manipulate a specific part of the sales and inventory system to execute unauthorized SQL commands, potentially gaining access to sensitive data in the database. This vulnerability affects versions up to 1.0 and requires the attacker to send specially crafted input to a specific file in the system.