<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SourceCodester — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sourcecodester/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 01 May 2026 05:16:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sourcecodester/feed.xml" rel="self" type="application/rss+xml"/><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to remote SQL injection via the ID parameter in the /ajax.php?action=delete_customer endpoint, allowing attackers to potentially read, modify, or delete database information.</description><content:encoded><![CDATA[<p>On May 1, 2026, a SQL injection vulnerability, CVE-2026-7549, was disclosed in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides in the <code>/ajax.php?action=delete_customer</code> endpoint, where the <code>ID</code> parameter is susceptible to manipulation, enabling remote attackers to inject arbitrary SQL commands. Publicly available exploit code exists, increasing the risk of exploitation. Successful exploitation can lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. This vulnerability is particularly concerning due to the sensitive nature of pharmacy data, potentially impacting confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies the vulnerable <code>/ajax.php?action=delete_customer</code> endpoint in SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the vulnerable endpoint.</li>
<li>The malicious request includes a manipulated <code>ID</code> parameter containing a SQL injection payload.</li>
<li>The application fails to properly sanitize the <code>ID</code> parameter before incorporating it into a SQL query.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker gains unauthorized access to sensitive data, such as customer information, prescription details, or inventory levels.</li>
<li>The attacker may modify or delete data within the database, potentially disrupting pharmacy operations or causing data integrity issues.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7549) can lead to the complete compromise of the SourceCodester Pharmacy Sales and Inventory System database. Attackers could potentially exfiltrate sensitive patient data, modify prescription information, or disrupt pharmacy operations by deleting critical data. The vulnerability has a CVSS v3.1 score of 7.3 (HIGH), indicating a significant risk. The number of victims and specific sectors targeted remain unknown, but any pharmacy using the affected version is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to all user-supplied input, especially the <code>ID</code> parameter in <code>/ajax.php?action=delete_customer</code>, to prevent SQL injection (CWE-89).</li>
<li>Deploy the Sigma rule &ldquo;Detect SQL Injection Attempts in Pharmacy Sales System&rdquo; to identify and block malicious requests targeting the vulnerable endpoint.</li>
<li>Upgrade to a patched version of SourceCodester Pharmacy Sales and Inventory System that addresses CVE-2026-7549 once available.</li>
<li>Monitor web server logs for suspicious activity, such as unusual requests to <code>/ajax.php?action=delete_customer</code>, to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>vulnerability</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</link><pubDate>Fri, 01 May 2026 05:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-pharmacy-inventory-sql-injection/</guid><description>CVE-2026-7550 is an SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the ID argument in the /ajax.php?action=save_customer endpoint.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection via the /ajax.php?action=save_customer endpoint. Disclosed on May 1, 2026, the vulnerability, identified as CVE-2026-7550, allows unauthenticated remote attackers to inject arbitrary SQL commands by manipulating the <code>ID</code> argument. The vulnerability exists due to insufficient input validation. Public exploit code is available, increasing the risk of exploitation. This vulnerability allows attackers to potentially read, modify, or delete sensitive data within the application&rsquo;s database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the vulnerable endpoint <code>/ajax.php?action=save_customer</code> within the Pharmacy Sales and Inventory System 1.0 application.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/ajax.php?action=save_customer</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>ID</code> parameter designed to inject SQL commands.</li>
<li>The application fails to properly sanitize the input provided in the <code>ID</code> parameter.</li>
<li>The application executes the attacker-supplied SQL code against the database.</li>
<li>The attacker can retrieve sensitive information, such as customer details, product information, or administrative credentials.</li>
<li>The attacker may modify existing data, such as prices or inventory levels.</li>
<li>The attacker may gain complete control of the database, potentially leading to full system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7550) can lead to unauthorized access to sensitive data, data modification, or complete database compromise. This could result in financial losses, reputational damage, and legal repercussions for affected organizations. Given the nature of the application, attackers could potentially access patient data or prescription information, leading to severe privacy breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_customer</code> endpoint to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious requests targeting the <code>/ajax.php?action=save_customer</code> endpoint with unusual <code>ID</code> parameter values. Deploy the provided Sigma rule to detect potential exploitation attempts.</li>
<li>Consider using a Web Application Firewall (WAF) to filter out malicious requests targeting this vulnerability.</li>
<li>Upgrade to a patched version of the SourceCodester Pharmacy Sales and Inventory System once available.</li>
<li>Implement regular database backups to mitigate potential data loss due to successful exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>web-application</category><category>cve-2026-7550</category></item><item><title>SourceCodester Advanced School Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</link><pubDate>Fri, 01 May 2026 02:16:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-asms-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7545) exists in SourceCodester Advanced School Management System 1.0 within the checkEmail endpoint of commonController.php, allowing remote attackers to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Advanced School Management System version 1.0 is vulnerable to SQL injection in the <code>checkEmail</code> endpoint within the <code>commonController.php</code> file. This vulnerability, identified as CVE-2026-7545, allows a remote attacker to inject arbitrary SQL commands. Publicly available exploits targeting this vulnerability increase the risk of exploitation. Successful exploitation could lead to unauthorized data access, modification, or deletion within the application&rsquo;s database. Given the availability of public exploits, organizations using this software are at an elevated risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies the <code>checkEmail</code> endpoint in <code>commonController.php</code>.</li>
<li>The attacker crafts a malicious HTTP request to the <code>checkEmail</code> endpoint, injecting SQL code into the email parameter.</li>
<li>The vulnerable application fails to properly sanitize the email input.</li>
<li>The injected SQL code is passed directly to the database query.</li>
<li>The database executes the malicious SQL code.</li>
<li>The attacker gains unauthorized access to the database.</li>
<li>The attacker may then read sensitive data, modify existing data, or insert new malicious data.</li>
<li>The attacker might also use this to escalate privileges within the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-7545) could allow an attacker to read, modify, or delete sensitive data stored in the Advanced School Management System database. This could include student records, financial information, or administrative credentials. The availability of public exploits increases the likelihood of attacks targeting this vulnerability, potentially impacting any organization using the affected software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>checkEmail</code> endpoint in <code>commonController.php</code> to prevent SQL injection attacks.</li>
<li>Deploy the Sigma rule <code>Detect ASMS CheckEmail SQL Injection Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious activity related to the <code>checkEmail</code> endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web-application</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sqli/</guid><description>A remote SQL injection vulnerability exists in SourceCodester Pharmacy Sales and Inventory System 1.0 via manipulation of the ID parameter in the /ajax.php?action=delete_category endpoint, potentially leading to unauthorized data access or modification.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. The vulnerability resides within the <code>/ajax.php?action=delete_category</code> endpoint, where a manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This allows remote attackers to potentially bypass authentication, access sensitive data, modify database contents, or even compromise the entire system. Given the availability of a published exploit, this vulnerability poses a significant risk to organizations utilizing the affected software. Successful exploitation requires no authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_category</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the attacker-controlled SQL query.</li>
<li>Depending on the injected SQL, the attacker can read sensitive data from the database (e.g., user credentials, financial records).</li>
<li>The attacker could also modify data, such as altering inventory levels or creating unauthorized accounts.</li>
<li>Ultimately, the attacker could gain full control of the database and the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability could result in unauthorized access to sensitive patient data, financial records, and other confidential information stored within the Pharmacy Sales and Inventory System database. Attackers could potentially modify data, leading to incorrect inventory levels, fraudulent transactions, or even complete system compromise. This could result in significant financial losses, reputational damage, and legal repercussions for affected organizations. Given that the exploit is public, organizations using this software are at immediate risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply input validation and sanitization to the <code>ID</code> parameter within the <code>/ajax.php?action=delete_category</code> endpoint to prevent SQL injection (reference CVE-2026-7130).</li>
<li>Deploy the provided Sigma rule to detect suspicious requests to the <code>/ajax.php?action=delete_category</code> endpoint containing potential SQL injection attempts.</li>
<li>Implement regular security audits and penetration testing to identify and remediate vulnerabilities in web applications.</li>
<li>Restrict database access privileges to the minimum necessary for each user and application to limit the potential impact of a successful SQL injection attack.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7130</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability (CVE-2026-7199)</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</link><pubDate>Tue, 28 Apr 2026 00:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-inventory-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-7199) exists in SourceCodester Pharmacy Sales and Inventory System 1.0, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'ID' parameter in the `/ajax.php?action=delete_product` endpoint, potentially leading to data breach or system compromise.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability has been identified in SourceCodester Pharmacy Sales and Inventory System version 1.0. This vulnerability, assigned CVE-2026-7199, affects the <code>/ajax.php?action=delete_product</code> endpoint. Attackers can remotely exploit this vulnerability by manipulating the <code>ID</code> parameter. The vulnerability was published on April 27, 2026, and the exploit is now publicly available. Successful exploitation allows attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access, modification, or deletion. Due to the ease of exploitation and the sensitive nature of pharmacy data, this vulnerability poses a significant risk to organizations using the affected system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>The attacker injects SQL code into the <code>ID</code> parameter of the request.</li>
<li>The server-side application fails to properly sanitize the input, passing the malicious SQL code to the database.</li>
<li>The database executes the injected SQL code, potentially allowing the attacker to bypass authentication, access sensitive data, modify database records, or execute system commands.</li>
<li>The attacker retrieves sensitive data, such as patient information, prescription details, or financial records.</li>
<li>The attacker may escalate privileges within the application and the underlying system.</li>
<li>The attacker can then exfiltrate the compromised data or maintain persistent access to the system for future attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a complete compromise of the Pharmacy Sales and Inventory System. This can result in the theft of sensitive patient data, financial records, and other confidential information. The vulnerability allows attackers to potentially modify or delete critical data, leading to disruption of pharmacy operations, financial losses, and regulatory penalties. As the exploit is publicly available, the likelihood of widespread exploitation is high, impacting any organization using the vulnerable version of the software.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify potential exploitation attempts against the <code>/ajax.php?action=delete_product</code> endpoint.</li>
<li>Inspect web server logs for requests to <code>/ajax.php?action=delete_product</code> containing suspicious characters or SQL keywords in the <code>ID</code> parameter, as detected by the <code>Detecting SQL Injection in Pharmacy System</code> Sigma rule.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in the SourceCodester Pharmacy Sales and Inventory System, mitigating the underlying issue.</li>
<li>Restrict access to the database server and sensitive data to only authorized personnel, reducing the potential impact of a successful SQL injection attack.</li>
<li>Monitor database logs for suspicious activity, such as unauthorized data access or modification, which may indicate successful exploitation of CVE-2026-7199.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-7199</category><category>web-application</category></item><item><title>SourceCodester Pharmacy Sales and Inventory System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</link><pubDate>Mon, 27 Apr 2026 06:16:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-pharmacy-sales-sqli/</guid><description>SourceCodester Pharmacy Sales and Inventory System 1.0 is vulnerable to SQL injection by manipulating the ID argument in the /ajax.php?action=save_receiving file, allowing remote attackers to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Pharmacy Sales and Inventory System version 1.0 is susceptible to SQL injection. The vulnerability resides in the <code>/ajax.php?action=save_receiving</code> file, where manipulation of the <code>ID</code> argument can lead to arbitrary SQL command execution. This vulnerability allows remote attackers to compromise the application&rsquo;s database. The exploit is publicly available, increasing the risk of exploitation. This vulnerability allows attackers to read, modify, or delete sensitive data, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of SourceCodester Pharmacy Sales and Inventory System version 1.0.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>/ajax.php?action=save_receiving</code> endpoint.</li>
<li>The attacker injects a SQL payload into the <code>ID</code> parameter of the request.</li>
<li>The web server processes the request and passes the injected SQL query to the database.</li>
<li>The database executes the malicious SQL query, potentially returning sensitive data to the attacker.</li>
<li>The attacker may use the SQL injection to bypass authentication, allowing them to access administrative functions.</li>
<li>The attacker may use the SQL injection to modify inventory data, manipulate sales records, or create fraudulent transactions.</li>
<li>The attacker may use the SQL injection to exfiltrate sensitive data such as customer information, financial records, and administrator credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to unauthorized access to sensitive data, modification of inventory and sales records, and potentially full control of the application and underlying server. This could result in financial loss, reputational damage, and legal repercussions for affected organizations. Given the public availability of the exploit, the risk of widespread exploitation is high. The impact could include data breaches, financial fraud, and complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detecting SQL Injection Attempts via URI</code> to identify malicious requests targeting the vulnerable endpoint.</li>
<li>Apply input validation and sanitization to the <code>ID</code> parameter in the <code>/ajax.php?action=save_receiving</code> file to prevent SQL injection attacks.</li>
<li>Monitor web server logs for suspicious activity, such as error messages or unusual requests targeting the <code>/ajax.php?action=save_receiving</code> endpoint (webserver log source).</li>
<li>Upgrade to a patched version of the application or implement a web application firewall (WAF) rule to block malicious requests.</li>
<li>Implement least privilege principles for database access to limit the impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>web-application</category><category>cve-2026-7088</category></item><item><title>SourceCodester Hotel Management System SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-hotel-management-sqli/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-hotel-management-sqli/</guid><description>A SQL injection vulnerability exists in SourceCodester Hotel Management System 1.0 in the /index.php/reservation/check component due to improper sanitization of the room_type parameter, allowing a remote attacker to execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>SourceCodester Hotel Management System version 1.0 is vulnerable to SQL injection. The vulnerability is located in the <code>/index.php/reservation/check</code> endpoint. Specifically, the <code>room_type</code> parameter is not properly sanitized, allowing for the injection of malicious SQL queries. This vulnerability can be exploited remotely and has been publicly disclosed, making it accessible to a wide range of threat actors. Successful exploitation allows attackers to read, modify, or delete sensitive data within the application&rsquo;s database. This could lead to unauthorized access, data breaches, and potential disruption of hotel operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable instance of SourceCodester Hotel Management System 1.0.</li>
<li>The attacker crafts a malicious HTTP GET or POST request targeting the <code>/index.php/reservation/check</code> endpoint.</li>
<li>The malicious request includes a SQL injection payload within the <code>room_type</code> parameter.</li>
<li>The application processes the request without proper sanitization of the <code>room_type</code> parameter.</li>
<li>The injected SQL code is executed against the application&rsquo;s database.</li>
<li>The attacker extracts sensitive information from the database, such as user credentials, reservation details, or financial data.</li>
<li>The attacker may use the extracted credentials to gain unauthorized access to administrative panels.</li>
<li>The attacker may further compromise the system by modifying data, creating rogue accounts, or planting malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to significant data breaches, impacting both the hotel and its customers. Sensitive customer data, including personal information, reservation details, and payment information, could be exposed. The vulnerability could allow attackers to gain administrative access to the Hotel Management System, leading to further compromise of the system and potential disruption of hotel operations. Depending on the database configuration, the attacker may even be able to execute commands on the underlying operating system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to detect SQL injection attempts targeting the <code>/index.php/reservation/check</code> endpoint in web server logs.</li>
<li>Implement input validation and sanitization for all user-supplied input, especially the <code>room_type</code> parameter, to prevent SQL injection attacks.</li>
<li>Patch or upgrade to a secure version of SourceCodester Hotel Management System that addresses this SQL injection vulnerability. If a patch is unavailable, consider implementing a web application firewall (WAF) rule to filter out malicious requests.</li>
<li>Review and harden database security configurations to limit the privileges of the database user account used by the application.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>vulnerability</category><category>web application</category></item></channel></rss>