Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-30576: n/a

0
High
VulnerabilityCVE-2026-30576cvecve-2026-30576
Published: Fri Mar 27 2026 (03/27/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0 in the add-stock.php file. The application fails to validate the "txtprice" and "txttotalcost" parameters during stock entry, allowing negative financial values to be submitted. This leads to corruption of financial records, allowing attackers to manipulate inventory asset values and procurement costs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 18:06:09 UTC

Technical Analysis

CVE-2026-30576 identifies a business logic vulnerability in the SourceCodester Pharmacy Product Management System version 1.0, located in the add-stock.php script. The vulnerability arises because the application fails to validate the 'txtprice' and 'txttotalcost' input parameters during stock entry operations. Specifically, it allows negative values to be submitted and processed, which should normally be disallowed in financial contexts. This lack of validation permits attackers to manipulate the system’s financial records by entering negative prices or total costs, thereby corrupting inventory asset valuations and procurement cost data. Such manipulation can distort financial reporting, inventory management, and procurement processes, potentially leading to inaccurate accounting, financial losses, or fraudulent activities. The vulnerability does not require authentication or user interaction, making it easier to exploit if the attacker can access the stock entry interface. No CVSS score has been assigned yet, and no public exploits are known at this time. The vulnerability is a classic example of business logic flaws where improper input validation leads to financial data integrity issues rather than direct system compromise or data leakage.

Potential Impact

The primary impact of this vulnerability is the corruption of financial records within the affected pharmacy management system. Attackers can manipulate inventory asset values and procurement costs by submitting negative financial values, which can lead to inaccurate financial statements, misinformed business decisions, and potential financial losses. Organizations relying on this system may face audit failures, regulatory compliance issues, and reputational damage if financial discrepancies are discovered. While the vulnerability does not directly compromise confidentiality or availability, the integrity of financial data is critically affected. This can also facilitate fraudulent activities such as unauthorized financial adjustments or embezzlement. The scope is limited to organizations using this specific version of the SourceCodester Pharmacy Product Management System, but the impact on affected entities can be severe, especially in healthcare environments where accurate inventory and procurement data are essential.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict server-side validation to ensure that the 'txtprice' and 'txttotalcost' parameters cannot accept negative values or other invalid inputs. Input validation should be enforced regardless of any client-side checks. Additionally, a thorough audit of existing financial and inventory data should be conducted to identify and correct any corrupted records resulting from exploitation. Applying patches or updates from the vendor, if available, is critical. If no official patch exists, organizations should consider custom code fixes or input sanitization measures. Access to the stock entry interface should be restricted to authorized personnel only, and logging should be enabled to detect suspicious activities related to stock and financial data entries. Regular security reviews and business logic testing should be incorporated into the development lifecycle to prevent similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-04T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c6c6913c064ed76fdc295e

Added to database: 3/27/2026, 6:04:01 PM

Last enriched: 3/27/2026, 6:06:09 PM

Last updated: 3/28/2026, 1:15:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses