CVE-2026-30556
Received Received - Intake
Reflected XSS in SourceCodester Sales Inventory System via msg Parameter

Publication date: 2026-03-30

Last updated on: 2026-04-01

Assigner: MITRE

Description
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the index.php file via the "msg" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-30
Last Modified
2026-04-01
Generated
2026-05-06
AI Q&A
2026-03-30
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ahsanriaz26gmailcom sales_and_inventory_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30556 is a Reflected Cross-Site Scripting (XSS) vulnerability found in the SourceCodester Sales and Inventory System version 1.0, specifically in the index.php file via the "msg" parameter.

The vulnerability occurs because the application does not properly sanitize or escape the input received through the "msg" parameter in a GET request. This allows remote attackers to inject arbitrary web scripts or HTML code via a crafted URL.

When a victim accesses such a crafted URL, the malicious script executes in their browser context, potentially leading to unauthorized actions.


How can this vulnerability impact me? :

This vulnerability can have several impacts on users and the system:

  • Attackers can execute arbitrary JavaScript code in the victim's browser.
  • It can lead to session hijacking by stealing session cookies.
  • Attackers can perform phishing attacks by altering page content to deceive users.
  • It may allow attackers to execute actions on behalf of the user without their consent.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the "msg" parameter in the index.php page for reflected Cross-Site Scripting (XSS). One way to do this is by accessing a crafted URL that injects a script payload and observing if the script executes.

For example, you can use a web browser or command-line tools like curl to send a GET request with a payload in the "msg" parameter.

  • curl "http://<target-ip-or-domain>/index.php?msg=%3Cimg%20src=%22x%22%20onerror=%22alert(789547)%22%3E&type=error"

If the alert or injected script executes or the payload is reflected unsanitized in the response, it confirms the presence of the vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Reflected Cross-Site Scripting (XSS) vulnerability in the SourceCodester Sales and Inventory System 1.0 allows attackers to execute arbitrary scripts in users' browsers, which can lead to session hijacking, phishing, and unauthorized actions on behalf of users.

Such security weaknesses can impact compliance with common standards and regulations like GDPR and HIPAA because they may lead to unauthorized access to personal or sensitive data, compromise user privacy, and fail to ensure adequate protection of user information.

Specifically, GDPR requires organizations to implement appropriate technical measures to protect personal data, and XSS vulnerabilities undermine this by enabling attackers to steal session cookies or manipulate user interactions.

Similarly, HIPAA mandates safeguarding electronic protected health information (ePHI), and vulnerabilities like XSS can expose such information through unauthorized access or manipulation.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the Reflected Cross-Site Scripting (XSS) vulnerability in SourceCodester Sales and Inventory System 1.0, immediate steps include sanitizing and properly escaping the input received via the "msg" parameter in the index.php file.

Additionally, avoid using unsanitized user input directly in the HTML output. Implement input validation and output encoding to prevent injection of arbitrary scripts.

As a temporary measure, restrict access to the affected page or disable the vulnerable functionality until a patch or update is available.

Educate users to avoid clicking on suspicious or crafted URLs that may exploit this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart