Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3792: SQL Injection in SourceCodester Sales and Inventory System

0
Medium
VulnerabilityCVE-2026-3792cvecve-2026-3792
Published: Mon Mar 09 2026 (03/09/2026, 01:02:08 UTC)
Source: CVE Database V5
Vendor/Project: SourceCodester
Product: Sales and Inventory System

Description

A vulnerability was found in SourceCodester Sales and Inventory System 1.0. This affects an unknown part of the file purchase_invoice.php of the component GET Parameter Handler. The manipulation of the argument purchaseid results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used.

AI-Powered Analysis

AILast updated: 03/09/2026, 01:52:00 UTC

Technical Analysis

CVE-2026-3792 identifies a SQL injection vulnerability in SourceCodester Sales and Inventory System version 1.0, specifically within the purchase_invoice.php component. The vulnerability arises from improper handling of the 'purchaseid' GET parameter, which is not adequately sanitized or validated before being incorporated into SQL queries. This flaw allows remote attackers to inject malicious SQL code by manipulating the 'purchaseid' parameter, potentially leading to unauthorized data retrieval, modification, or deletion within the underlying database. The attack vector is network-based and does not require authentication or user interaction, making it easier to exploit. The CVSS 4.0 base score of 5.3 reflects a medium severity, considering the low attack complexity but limited impact scope and privileges required. Although no active exploits have been reported in the wild, the public disclosure of exploit code increases the risk of exploitation. The vulnerability affects only version 1.0 of the product, and no official patches have been linked yet. This vulnerability exemplifies common web application security issues related to insufficient input validation and parameterized query usage.

Potential Impact

The exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive sales and inventory data, including purchase records and financial information. Attackers could manipulate database contents, causing data integrity issues or denial of service by corrupting or deleting critical records. This could disrupt business operations, lead to financial losses, and damage organizational reputation. In regulated industries, such breaches may also result in compliance violations and legal consequences. Since the vulnerability can be exploited remotely without authentication, it poses a significant risk to any organization using the affected software version, especially those exposing the application to the internet. The medium severity rating suggests moderate impact, but the actual damage depends on the database privileges of the application and the sensitivity of stored data.

Mitigation Recommendations

Organizations should immediately audit their use of SourceCodester Sales and Inventory System version 1.0 and restrict external access to the affected purchase_invoice.php endpoint. Implement strict input validation and sanitization for all GET parameters, especially 'purchaseid', using allowlists and parameterized queries or prepared statements to prevent SQL injection. Deploy web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting this parameter. Monitor database logs for unusual queries or errors indicative of injection attempts. If possible, isolate the database with least privilege principles to limit the impact of any successful injection. Regularly back up databases to enable recovery from potential data corruption. Engage with the vendor or community for patches or updates addressing this vulnerability and apply them promptly once available. Conduct security testing and code reviews to identify and remediate similar injection flaws in other parts of the application.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-08T07:24:01.867Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ae24662904315ca31e22a4

Added to database: 3/9/2026, 1:37:42 AM

Last enriched: 3/9/2026, 1:52:00 AM

Last updated: 3/12/2026, 8:14:42 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses