Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3790: SQL Injection in SourceCodester Sales and Inventory System

0
Medium
VulnerabilityCVE-2026-3790cvecve-2026-3790
Published: Mon Mar 09 2026 (03/09/2026, 00:02:09 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Sales and Inventory System

Description

A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:30:52 UTC

Technical Analysis

CVE-2026-3790 is an SQL injection vulnerability identified in SourceCodester Sales and Inventory System version 1.0. The vulnerability resides in the check_supplier_details.php file, specifically in the POST parameter stock_name1, which is improperly sanitized or validated. This allows an attacker to inject malicious SQL code remotely without requiring authentication or user interaction. The injection flaw can lead to unauthorized data retrieval, modification, or deletion within the backend database, compromising data confidentiality, integrity, and availability. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The scope is limited to the vulnerable component, and the impact on confidentiality, integrity, and availability is low to medium. Although no active exploitation in the wild has been reported, the availability of a public exploit increases the likelihood of future attacks. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. Organizations using this system should monitor for updates and consider immediate mitigations to prevent exploitation.

Potential Impact

The impact of CVE-2026-3790 includes potential unauthorized access to sensitive supplier and inventory data, data manipulation, and disruption of inventory management processes. Exploitation can lead to leakage of confidential business information, alteration of stock records, and potential denial of service if the database is corrupted. This can affect operational continuity, financial reporting accuracy, and supply chain reliability. Organizations relying on SourceCodester Sales and Inventory System version 1.0 may face increased risk of data breaches and operational disruptions. The medium severity rating reflects moderate risk, but the ease of remote exploitation without authentication raises concern for widespread attacks if mitigations are not applied promptly.

Mitigation Recommendations

1. Immediate mitigation should include implementing input validation and parameterized queries or prepared statements in the check_supplier_details.php file to prevent SQL injection. 2. Restrict access to the vulnerable endpoint by applying network-level controls such as IP whitelisting or VPN access where feasible. 3. Monitor web application logs for suspicious requests targeting the stock_name1 parameter to detect potential exploitation attempts. 4. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection payloads targeting this parameter. 5. Regularly update and patch the SourceCodester Sales and Inventory System once official fixes become available from the vendor. 6. Conduct security audits and code reviews of custom or third-party components to identify and remediate similar injection flaws. 7. Educate development teams on secure coding practices to prevent future injection vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T07:23:54.048Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae12d72904315ca30ac9b0

Added to database: 3/9/2026, 12:22:47 AM

Last enriched: 3/16/2026, 9:30:52 AM

Last updated: 4/28/2026, 7:21:57 AM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses