CVE-2026-4778

A weakness has been identified in SourceCodester Sales and Inventory System 1.0. This vulnerability affects unknown code of the file update_category.php of the component HTTP GET Parameter Handler. This manipulation of the argument sid causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks.
References
Link Resource
https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdateCategory-sid.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.352796 Permissions Required VDB Entry
https://vuldb.com/?id.352796 Third Party Advisory VDB Entry
https://vuldb.com/?submit.775171 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*

History

08 Apr 2026, 18:43

Type Values Removed Values Added
First Time Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPE cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
References () https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdateCategory-sid.md - () https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdateCategory-sid.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.352796 - () https://vuldb.com/?ctiid.352796 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.352796 - () https://vuldb.com/?id.352796 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.775171 - () https://vuldb.com/?submit.775171 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product

25 Mar 2026, 15:41

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en SourceCodester Sales and Inventory System 1.0. Esta vulnerabilidad afecta a código desconocido del archivo update_category.php del componente HTTP GET Parameter Handler. Esta manipulación del argumento sid causa inyección SQL. La explotación remota del ataque es posible. El exploit se ha puesto a disposición del público y podría usarse para ataques.

24 Mar 2026, 23:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 23:17

Updated : 2026-04-29 01:00


NVD link : CVE-2026-4778

Mitre link : CVE-2026-4778

CVE.ORG link : CVE-2026-4778


JSON object : View

Products Affected

ahsanriaz26gmailcom

  • sales_and_inventory_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')