<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-4838 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-4838/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 04:17:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-4838/feed.xml" rel="self" type="application/rss+xml"/><item><title>SourceCodester Malawi Online Market SQL Injection Vulnerability (CVE-2026-4838)</title><link>https://feed.craftedsignal.io/briefs/2026-03-malawi-online-market-sqli/</link><pubDate>Thu, 26 Mar 2026 04:17:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-malawi-online-market-sqli/</guid><description>A remote SQL injection vulnerability (CVE-2026-4838) exists in the /display.php file of SourceCodester Malawi Online Market 1.0 due to improper input sanitization of the ID parameter, potentially allowing attackers to execute arbitrary SQL queries.</description><content:encoded><![CDATA[<p>The SourceCodester Malawi Online Market 1.0 is vulnerable to SQL injection (CVE-2026-4838). The vulnerability resides within the <code>/display.php</code> file, specifically in how the application handles the <code>ID</code> parameter. A remote attacker can manipulate this parameter to inject arbitrary SQL commands into the database query. This can potentially allow the attacker to read, modify, or delete sensitive data, or even gain control of the underlying database server. The vulnerability was published on…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-4838</category></item></channel></rss>