CVE-2026-32712
Received Received - Intake
Stored XSS in Open Source POS Daily Sales Table

Publication date: 2026-04-07

Last updated on: 2026-04-14

Assigner: GitHub, Inc.

Description
Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Prior to 3.4.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Daily Sales management table. The customer_name column is configured with escape: false in the bootstrap-table column configuration, causing customer names to be rendered as raw HTML. An attacker with customer management permissions can inject arbitrary JavaScript into a customer's first_name or last_name field, which executes in the browser of any user viewing the Daily Sales page. This vulnerability is fixed in 3.4.3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
opensourcepos open_source_point_of_sale to 3.4.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Stored Cross-Site Scripting (XSS) issue in the Open Source Point of Sale application prior to version 3.4.3. It occurs in the Daily Sales management table where the customer_name column is configured to render content as raw HTML without escaping. An attacker who has customer management permissions can inject malicious JavaScript code into a customer's first_name or last_name fields. This injected script then executes in the browsers of any users who view the Daily Sales page, potentially compromising their security.


How can this vulnerability impact me? :

The impact of this vulnerability includes the execution of arbitrary JavaScript code in the browsers of users who view the affected Daily Sales page. This can lead to unauthorized actions such as stealing session cookies, redirecting users to malicious sites, or performing actions on behalf of the user without their consent. Since the attacker needs customer management permissions to inject the script, the risk is somewhat limited to users with those privileges, but any user viewing the page can be affected.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Open Source Point of Sale to version 3.4.3 or later, where the Stored Cross-Site Scripting (XSS) issue in the Daily Sales management table has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart