CVE-2026-3790
SQL Injection in SourceCodester Sales Inventory POST Parameter
Publication date: 2026-03-09
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ahsanriaz26gmailcom | sales_and_inventory_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-3790 is a SQL injection vulnerability found in SourceCodester Sales and Inventory System version 1.0. The flaw exists in the POST parameter handler of the file check_supplier_details.php, specifically involving the stock_name1 parameter.
An attacker can manipulate the stock_name1 parameter with crafted input to inject arbitrary SQL commands because the application does not properly sanitize this input. This allows the attacker to modify the intended SQL query executed by the system.
The vulnerability supports various SQL injection techniques including UNION-based, Boolean-based blind, and time-based blind injections, enabling attackers to retrieve sensitive database information such as supplier details and credentials.
The attack can be executed remotely and requires authentication. Proof-of-concept exploits are publicly available, and the vulnerability is considered easy to exploit.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to compromise the confidentiality, integrity, and availability of your Sales and Inventory System.
- Attackers can extract sensitive data such as supplier information and credentials directly from the database.
- They can manipulate or modify database contents, potentially disrupting business operations.
- The systemβs availability may be affected if attackers exploit the vulnerability to perform denial-of-service or other disruptive actions.
Because the exploit can be executed remotely and is easy to perform, it poses a significant risk if the system is exposed to untrusted networks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the POST parameter "stock_name1" in the file check_supplier_details.php for SQL injection flaws. An authenticated user can send crafted POST requests with malicious payloads to check if the system is vulnerable.'}, {'type': 'paragraph', 'content': 'One effective method is to use the sqlmap tool to automate detection and exploitation attempts. For example, the following command can be used to test the vulnerability:'}, {'type': 'paragraph', 'content': 'sqlmap -u "http://127.0.0.1:8089/check_supplier_details.php" --data "stock_name1=Test+Supplier" --batch -v 6 --risk=3 --cookie "PHPSESSID=YOUR_COOKIE_HERE"'}, {'type': 'paragraph', 'content': 'Additionally, manual testing can be performed by sending POST requests with payloads such as UNION-based, Boolean-based blind, or time-based blind SQL injection strings in the "stock_name1" parameter to observe if the system behaves unexpectedly or returns database errors.'}, {'type': 'list_item', 'content': "UNION-based payload example: stock_name1=Test Supplier' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x71716b7171,0x49785943476c514266495a6d73764652796e6f66566c5a645a4c546c686d6c487056727754727353,0x716b626b71),NULL,NULL#"}, {'type': 'list_item', 'content': "Boolean-based blind payload example: stock_name1=Test Supplier' OR NOT 2722=2722#"}, {'type': 'list_item', 'content': "Time-based blind payload example: stock_name1=Test Supplier' AND (SELECT 6459 FROM (SELECT(SLEEP(5)))ViNT)-- fojh"}] [3]
What immediate steps should I take to mitigate this vulnerability?
There are no documented mitigations or countermeasures specifically provided for this vulnerability.
The recommended immediate step is to replace or upgrade the affected component or product to a version that is not vulnerable.
In the meantime, restricting access to the vulnerable endpoint, implementing web application firewall (WAF) rules to detect and block SQL injection attempts, and ensuring proper input validation and sanitization can help reduce risk.