CVE-2026-7200
Received Received - Intake
Cross-Site Scripting in SourceCodester Pharmacy Inventory System

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. Affected by this issue is some unknown functionality of the file /index.php?page=types. Executing a manipulation of the argument ID can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sourcecodester pharmacy_sales_and_inventory_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to execute arbitrary scripts in users' browsers, potentially stealing sensitive data such as cookies and session tokens. This unauthorized access and data theft can lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information.

Failure to prevent such cross-site scripting attacks may result in non-compliance with these standards, as they mandate appropriate security controls to protect user data from unauthorized access and disclosure.

Remediation steps such as proper output encoding, input validation, Content Security Policy implementation, and secure cookie flags are essential to maintain compliance by mitigating the risk of data breaches through this vulnerability.


How can this vulnerability impact me? :

This vulnerability can have several significant impacts on users and the system.

  • Attackers can steal cookies, session tokens, or other sensitive data from users.
  • Attackers may perform unauthorized actions on behalf of the victim.
  • Web pages can be defaced or altered by malicious scripts.
  • Users can be redirected to malicious websites.
  • Attackers might gain control over the victim's browser.

Can you explain this vulnerability to me?

The CVE-2026-7200 vulnerability is a Cross-Site Scripting (XSS) flaw found in the SourceCodester Pharmacy Sales and Inventory System 1.0, specifically in the '/index.php?page=types' file.

The issue arises because the 'id' parameter is improperly handled: user input is directly output to the web page without proper encoding or filtering.

This allows attackers to inject malicious scripts that execute in the victim's browser when they visit the affected page.

Exploitation can be done remotely and does not require user login or authorization.

A proof-of-concept example is injecting a script like `<script>prompt(/xss/);</script>` via the 'id' parameter in the URL.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the 'id' parameter in the URL of the affected file '/index.php?page=types' for Cross-Site Scripting (XSS) by injecting a script payload.

  • Use a web browser or tools like curl or wget to send a request with a script payload in the 'id' parameter, for example: http://yourserver/pharmacy/index.php?page=types&id=<script>prompt(/xss/);</script>
  • Observe if the injected script executes or appears in the response without proper encoding, indicating the presence of the XSS vulnerability.
  • Example curl command to test the vulnerability: curl -i "http://yourserver/pharmacy/index.php?page=types&id=<script>prompt(/xss/);</script>"

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Implement proper output encoding for user inputs based on context (HTML, JavaScript, CSS, URL) to ensure inputs are treated as text, not executable code.
  • Enforce strict input validation and filtering to accept only expected input formats and reject or escape potentially malicious content such as script tags or event handlers.
  • Implement a strict Content Security Policy (CSP) to limit script sources and prevent execution of unauthorized inline or external scripts.
  • Set HttpOnly and Secure flags on sensitive cookies to prevent JavaScript access and ensure transmission over HTTPS, mitigating cookie theft risks.
  • Conduct regular security audits and code reviews to detect and address XSS and other vulnerabilities promptly.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart