CVE-2026-30576
Received Received - Intake
Business Logic Flaw in SourceCodester Pharmacy Allows Financial Manipulation

Publication date: 2026-03-27

Last updated on: 2026-03-31

Assigner: MITRE

Description
A Business Logic vulnerability exists in SourceCodester Pharmacy Product Management System 1.0 in the add-stock.php file. The application fails to validate the "txtprice" and "txttotalcost" parameters during stock entry, allowing negative financial values to be submitted. This leads to corruption of financial records, allowing attackers to manipulate inventory asset values and procurement costs.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-27
Last Modified
2026-03-31
Generated
2026-05-07
AI Q&A
2026-03-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
senior-walter web-based_pharmacy_product_management_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to manipulate financial records by submitting negative values for procurement price and total cost, leading to corruption of financial data and potential financial reporting fraud.

Such manipulation can undermine the accuracy and integrity of financial statements, which may impact compliance with regulations that require accurate financial reporting and data integrity, such as those related to financial audits and corporate governance.

However, there is no direct information provided about the impact on privacy-related regulations like GDPR or HIPAA, which focus on personal data protection rather than financial data integrity.


Can you explain this vulnerability to me?

The CVE-2026-30576 vulnerability is a critical Business Logic Error found in the SourceCodester Pharmacy Product Management System version 1.0, specifically in the add-stock.php file responsible for the Stock Entry module.

The flaw arises from improper input validation of the POST parameters `txtprice` and `txttotalcost`, which represent the procurement price and total cost of stock items. The system fails to enforce that these values must be positive, allowing an attacker to submit negative values by intercepting and modifying HTTP requests.

This allows financial manipulation by recording negative procurement costs, effectively treating stock additions as credits or negative expenses, which corrupts financial records and business logic.


How can this vulnerability impact me? :

This vulnerability can severely corrupt financial statements by artificially lowering the Cost of Goods Sold (COGS), inflating profits, or reducing the reported value of inventory assets.

Attackers can manipulate inventory asset values and procurement costs, potentially masking illicit inventory removal through cost basis adjustments.

Overall, it poses significant risks to the accuracy and reliability of the system’s financial data, leading to financial reporting fraud and data integrity corruption.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring and intercepting HTTP POST requests to the add-stock.php file in the Pharmacy Product Management System. Specifically, you should look for requests where the parameters `txtprice` and `txttotalcost` contain negative values, which are not properly validated by the system.

To detect such attempts, you can use a proxy tool (such as Burp Suite or OWASP ZAP) to intercept and inspect the requests when stock entries are made.

Additionally, you can search your web server logs or application logs for POST requests to add-stock.php with negative values in these parameters.

  • Use a command like `grep 'add-stock.php' /path/to/access.log | grep -E 'txtprice=-|txttotalcost=-'` to find suspicious requests in logs.
  • Use network traffic capture tools like `tcpdump` or `Wireshark` to capture HTTP POST requests and filter for negative values in the parameters.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing proper input validation on the server side to ensure that the `txtprice` and `txttotalcost` parameters cannot accept negative values.

Until a patch or fix is applied, monitor and block any requests that attempt to submit negative values for these parameters.

You can also restrict access to the add-stock.php functionality to trusted users only and audit stock entry records for any suspicious negative values.

Using a web application firewall (WAF) to filter out requests with negative values in these parameters can help reduce exploitation risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart