CVE-2026-3790
Received Received - Intake
SQL Injection in SourceCodester Sales Inventory POST Parameter

Publication date: 2026-03-09

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file check_supplier_details.php of the component POST Parameter Handler. Executing a manipulation of the argument stock_name1 can lead to sql injection. The attack can be executed remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-09
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ahsanriaz26gmailcom sales_and_inventory_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-74 The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3790 is a SQL injection vulnerability found in SourceCodester Sales and Inventory System version 1.0. The flaw exists in the POST parameter handler of the file check_supplier_details.php, specifically involving the stock_name1 parameter.

An attacker can manipulate the stock_name1 parameter with crafted input to inject arbitrary SQL commands because the application does not properly sanitize this input. This allows the attacker to modify the intended SQL query executed by the system.

The vulnerability supports various SQL injection techniques including UNION-based, Boolean-based blind, and time-based blind injections, enabling attackers to retrieve sensitive database information such as supplier details and credentials.

The attack can be executed remotely and requires authentication. Proof-of-concept exploits are publicly available, and the vulnerability is considered easy to exploit.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to compromise the confidentiality, integrity, and availability of your Sales and Inventory System.

  • Attackers can extract sensitive data such as supplier information and credentials directly from the database.
  • They can manipulate or modify database contents, potentially disrupting business operations.
  • The system’s availability may be affected if attackers exploit the vulnerability to perform denial-of-service or other disruptive actions.

Because the exploit can be executed remotely and is easy to perform, it poses a significant risk if the system is exposed to untrusted networks.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the POST parameter "stock_name1" in the file check_supplier_details.php for SQL injection flaws. An authenticated user can send crafted POST requests with malicious payloads to check if the system is vulnerable.'}, {'type': 'paragraph', 'content': 'One effective method is to use the sqlmap tool to automate detection and exploitation attempts. For example, the following command can be used to test the vulnerability:'}, {'type': 'paragraph', 'content': 'sqlmap -u "http://127.0.0.1:8089/check_supplier_details.php" --data "stock_name1=Test+Supplier" --batch -v 6 --risk=3 --cookie "PHPSESSID=YOUR_COOKIE_HERE"'}, {'type': 'paragraph', 'content': 'Additionally, manual testing can be performed by sending POST requests with payloads such as UNION-based, Boolean-based blind, or time-based blind SQL injection strings in the "stock_name1" parameter to observe if the system behaves unexpectedly or returns database errors.'}, {'type': 'list_item', 'content': "UNION-based payload example: stock_name1=Test Supplier' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x71716b7171,0x49785943476c514266495a6d73764652796e6f66566c5a645a4c546c686d6c487056727754727353,0x716b626b71),NULL,NULL#"}, {'type': 'list_item', 'content': "Boolean-based blind payload example: stock_name1=Test Supplier' OR NOT 2722=2722#"}, {'type': 'list_item', 'content': "Time-based blind payload example: stock_name1=Test Supplier' AND (SELECT 6459 FROM (SELECT(SLEEP(5)))ViNT)-- fojh"}] [3]


What immediate steps should I take to mitigate this vulnerability?

There are no documented mitigations or countermeasures specifically provided for this vulnerability.

The recommended immediate step is to replace or upgrade the affected component or product to a version that is not vulnerable.

In the meantime, restricting access to the vulnerable endpoint, implementing web application firewall (WAF) rules to detect and block SQL injection attempts, and ensuring proper input validation and sanitization can help reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart