CVE-2026-4781
MEDIUMSourceCodester Sales and Inventory System HTTP GET Parameter update_purchase.php sql injection
Title source: cnaDescription
A flaw has been found in SourceCodester Sales and Inventory System 1.0. The affected element is an unknown function of the file update_purchase.php of the component HTTP GET Parameter Handler. Executing a manipulation of the argument sid can lead to sql injection. The attack may be performed from remote. The exploit has been published and may be used.
References (5)
Core 5
Core References
Vdb Entry, Technical Description vdb-entry
technical-description
VDB-352799 | SourceCodester Sales and Inventory System HTTP GET Parameter update_purchase.php sql injection
https://vuldb.com/?id.352799
Signature, Permissions Required signature
permissions-required
VDB-352799 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/?ctiid.352799
Third Party Advisory third-party-advisory
Submit #775174 | SourceCodester Sales and Inventory System 1.0 SQL Injection
https://vuldb.com/?submit.775174
Patch exploit
patch
https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-UpdatePurchase-sid.md
Product product
https://www.sourcecodester.com/
Scores
CVSS v3
6.3
EPSS
0.0003
EPSS Percentile
9.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-74
CWE-89
Status
published
Products (2)
ahsanriaz26gmailcom/sales_and_inventory_system
1.0
SourceCodester/Sales and Inventory System
1.0
Published
Mar 25, 2026
Tracked Since
Mar 25, 2026