CVE-2026-3766

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to inject malicious scripts into the web-based pharmacy management system, potentially compromising user data and session information. It can be exploited remotely by manipulating the "fullname" field in the profile editing function, making it a risk for any user interacting with the system.

Technical Description

A security flaw has been discovered in SourceCodester Web-based Pharmacy Product Management System 1.0. This impacts an unknown function of the file edit-profile.php. Performing a manipulation of the argument fullname results in cross site scripting. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$690($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Mar 8, 2026

about 1 month ago

Last Modified

Mar 9, 2026

29 days ago

Vendor

senior-walter

Product

web-based pharmacy product management system