CVE-2026-4781

A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
References
Link Resource
https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdatePurchase-sid.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.352799 Permissions Required VDB Entry
https://vuldb.com/?id.352799 Third Party Advisory VDB Entry
https://vuldb.com/?submit.775174 Third Party Advisory VDB Entry
https://www.sourcecodester.com/ Product
Configurations

Configuration 1 (hide)

cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*

History

07 Apr 2026, 18:23

Type Values Removed Values Added
First Time Ahsanriaz26gmailcom
Ahsanriaz26gmailcom sales And Inventory System
CPE cpe:2.3:a:ahsanriaz26gmailcom:sales_and_inventory_system:1.0:*:*:*:*:*:*:*
References () https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdatePurchase-sid.md - () https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdatePurchase-sid.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.352799 - () https://vuldb.com/?ctiid.352799 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.352799 - () https://vuldb.com/?id.352799 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.775174 - () https://vuldb.com/?submit.775174 - Third Party Advisory, VDB Entry
References () https://www.sourcecodester.com/ - () https://www.sourcecodester.com/ - Product

25 Mar 2026, 15:41

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado un fallo en SourceCodester Sales and Inventory System 1.0. El elemento afectado es una función desconocida del archivo update_purchase.php del componente Gestor de Parámetros HTTP GET. La ejecución de una manipulación del argumento sid puede conducir a una inyección SQL. El ataque puede realizarse de forma remota. El exploit ha sido publicado y puede ser utilizado.

25 Mar 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 00:16

Updated : 2026-04-29 01:00


NVD link : CVE-2026-4781

Mitre link : CVE-2026-4781

CVE.ORG link : CVE-2026-4781


JSON object : View

Products Affected

ahsanriaz26gmailcom

  • sales_and_inventory_system
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')