High severity8.8NVD Advisory· Published Mar 20, 2026· Updated Apr 8, 2026
CVE-2026-32888
CVE-2026-32888
Description
Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom filter), user-supplied input from the search GET parameter is interpolated directly into a HAVING clause without parameterization or sanitization. This allows an authenticated attacker with basic item search permissions to execute arbitrary SQL queries. A patch did not exist at the time of publication.
Affected products
1- cpe:2.3:a:opensourcepos:open_source_point_of_sale:*:*:*:*:*:*:*:*Range: <=3.4.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/opensourcepos/opensourcepos/security/advisories/GHSA-hmjv-wm3j-pfhwnvdExploitVendor AdvisoryPatch
News mentions
0No linked articles in our index yet.