Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3754: SQL Injection in SourceCodester Sales and Inventory System

0
Medium
VulnerabilityCVE-2026-3754cvecve-2026-3754
Published: Sun Mar 08 2026 (03/08/2026, 17:32:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Sales and Inventory System

Description

A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown function of the file /add_stock.php. Performing a manipulation of the argument cost results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 03/08/2026, 17:52:30 UTC

Technical Analysis

CVE-2026-3754 is a SQL injection vulnerability identified in SourceCodester Sales and Inventory System version 1.0, specifically in the /add_stock.php script. The vulnerability stems from improper handling of the 'cost' parameter, which is directly incorporated into SQL queries without adequate sanitization or parameterization. This flaw allows remote attackers to inject malicious SQL code by manipulating the 'cost' argument, potentially enabling unauthorized access to or modification of the underlying database. The vulnerability requires no authentication or user interaction, increasing its risk profile. The CVSS 4.0 base score is 5.3, reflecting a medium severity due to the limited scope of impact and the requirement for some privileges (PR:L). The vulnerability affects the confidentiality, integrity, and availability of the system's data, though the scope is limited to the affected component. No official patches have been linked yet, but the public disclosure of exploit code increases the risk of exploitation. The vulnerability is particularly concerning for organizations relying on this software for inventory and sales management, as attackers could manipulate stock data or extract sensitive business information.

Potential Impact

The SQL injection vulnerability can lead to unauthorized data disclosure, data manipulation, or deletion within the affected database, compromising the confidentiality, integrity, and availability of critical business data. Attackers could potentially extract sensitive customer or financial information, alter inventory records, or disrupt sales operations. This could result in financial losses, reputational damage, and regulatory compliance issues for affected organizations. Since the vulnerability can be exploited remotely without authentication, any internet-facing deployment of the vulnerable system is at risk. The medium severity rating indicates a moderate but tangible threat, especially for small and medium enterprises that may lack robust security controls. The absence of known active exploits currently reduces immediate risk but the public availability of exploit code increases the likelihood of future attacks.

Mitigation Recommendations

1. Apply official patches or updates from SourceCodester as soon as they become available to address the vulnerability directly. 2. If patches are not yet available, implement immediate input validation and sanitization on the 'cost' parameter in /add_stock.php to ensure only valid numeric values are accepted. 3. Refactor the code to use parameterized queries or prepared statements to prevent SQL injection. 4. Employ web application firewalls (WAFs) with SQL injection detection and prevention rules to block malicious payloads targeting this vulnerability. 5. Conduct thorough security testing and code reviews of all input handling routines in the application to identify and remediate similar injection flaws. 6. Restrict access to the affected system to trusted networks or VPNs to reduce exposure. 7. Monitor logs for suspicious SQL query patterns or unusual database activity indicative of exploitation attempts. 8. Educate development teams on secure coding practices to prevent future injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:29:57.466Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69adb3e72904315ca3cfbc16

Added to database: 3/8/2026, 5:37:43 PM

Last enriched: 3/8/2026, 5:52:30 PM

Last updated: 3/13/2026, 5:33:58 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses