CVE-2026-3766
Cross-Site Scripting in SourceCodester Pharmacy edit-profile.php
Publication date: 2026-03-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| senior-walter | web-based_pharmacy_product_management_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-3766 is a stored Cross-Site Scripting (XSS) vulnerability found in SourceCodester Web-based Pharmacy Product Management System version 1.0, specifically in the edit-profile.php file.'}, {'type': 'paragraph', 'content': 'The vulnerability arises because the application does not properly sanitize or encode user input in the "fullname" parameter during profile updates. This allows an authenticated attacker to inject malicious JavaScript code into the fullname field.'}, {'type': 'paragraph', 'content': 'The injected script is persistently stored in the database and then rendered in global parts of the application, such as the header or navigation bar, causing the malicious code to execute automatically on every page load for users.'}, {'type': 'paragraph', 'content': 'Exploitation requires authentication and user interaction, and the attack can be initiated remotely.'}] [1, 2, 3]
How can this vulnerability impact me? :
Successful exploitation of this vulnerability allows attackers to execute arbitrary JavaScript code in the context of authenticated users.
- Session hijacking - attackers can steal session cookies to impersonate users.
- Privilege escalation - attackers may perform unauthorized actions by leveraging the injected scripts.
- Compromise of data integrity - malicious scripts can manipulate or alter data displayed or processed by the application.
- Potential widespread impact as the malicious script executes on every page load across the application for all users.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying the presence of the vulnerable edit-profile.php page in the SourceCodester Web-based Pharmacy Product Management System version 1.0 and testing the fullname parameter for cross-site scripting (XSS) flaws.'}, {'type': 'paragraph', 'content': 'One method to find potentially vulnerable targets is using Google dorking with queries such as "inurl:edit-profile.php" to locate instances of the affected page.'}, {'type': 'paragraph', 'content': "To confirm the vulnerability, an authenticated user can attempt to inject a script tag into the fullname field on the Edit Profile page, for example: `<script>alert('XSS')</script>`. If the script executes upon page rendering, the system is vulnerable."}] [1, 3]
What immediate steps should I take to mitigate this vulnerability?
No known countermeasures or mitigations have been documented for this vulnerability.
It is suggested to consider replacing the affected product with an alternative that does not contain this vulnerability.