CVE-2026-30569
Received Received - Intake
Reflected XSS in SourceCodester Inventory System view_stock_availability.php

Publication date: 2026-03-27

Last updated on: 2026-04-06

Assigner: MITRE

Description
A Reflected Cross-Site Scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The vulnerability is located in the view_stock_availability.php file via the "limit" parameter. The application fails to sanitize the input, allowing remote attackers to inject arbitrary web script or HTML via a crafted URL.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-04-06
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ahsanriaz26gmailcom inventory_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30569 is a Reflected Cross-Site Scripting (XSS) vulnerability found in SourceCodester Inventory System version 1.0, specifically in the view_stock_availability.php file.

The vulnerability occurs because the application accepts a GET parameter named "limit" which is used for pagination control, but it does not properly sanitize or encode this input.

This allows remote attackers to inject arbitrary web scripts or HTML via a crafted URL, which then gets reflected back and executed in the context of an authenticated user, such as an administrator.

For example, an attacker can craft a URL containing malicious JavaScript in the "limit" parameter, and if an administrator visits this URL, the script will execute, potentially leading to session hijacking or unauthorized actions.


How can this vulnerability impact me? :

This vulnerability can have serious impacts if exploited by an attacker.

  • Attackers can execute arbitrary JavaScript code in the context of authenticated users, such as administrators.
  • It can lead to hijacking of administrator sessions by stealing cookies.
  • Attackers may perform unauthorized actions with administrative privileges, potentially escalating their privileges.
  • Ultimately, this can result in full system compromise.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the 'limit' parameter in the view_stock_availability.php file for reflected Cross-Site Scripting (XSS). One way to do this is by sending a crafted URL containing a JavaScript payload in the 'limit' parameter and observing if the script executes.

For example, you can use a web browser or command-line tools like curl to request the following URL on your system:

  • http://127.0.0.1:8089/view_stock_availability.php?limit=\"><script>alert(15623);</script>

If an alert box with the number '15623' appears, it confirms the presence of the reflected XSS vulnerability.

Alternatively, you can use curl to fetch the page and inspect the response for the injected script:

  • curl -i "http://127.0.0.1:8089/view_stock_availability.php?limit=\"><script>alert(15623);</script>"

If the response contains the injected script without sanitization, the vulnerability exists.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing and validating the input received from the 'limit' GET parameter in the view_stock_availability.php file to prevent injection of arbitrary scripts.

Specifically, ensure that any user-supplied input is properly encoded before being reflected in the web page output.

Additionally, restrict access to the affected page to trusted users only and avoid clicking on suspicious or untrusted URLs containing parameters.

If possible, apply patches or updates provided by the vendor or developers that address this input validation flaw.

As a temporary workaround, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious script tags in the 'limit' parameter.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Reflected Cross-Site Scripting (XSS) vulnerability in SourceCodester Inventory System 1.0 allows attackers to execute arbitrary scripts in the context of authenticated administrators. This can lead to session hijacking and unauthorized administrative actions, potentially resulting in unauthorized access to sensitive data.

Such unauthorized access and potential data compromise can negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information against unauthorized access and breaches.

Therefore, exploitation of this vulnerability could lead to violations of these regulations due to failure to adequately protect user data and maintain system integrity.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart