VYPR
Low severity3.5NVD Advisory· Published Apr 8, 2026· Updated Apr 29, 2026

CVE-2026-5810

CVE-2026-5810

Description

A flaw has been found in SourceCodester Sales and Inventory System 1.0. Affected is an unknown function of the file /delete.php of the component GET Parameter Handler. This manipulation of the argument ID causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Sales and Inventory System 1.0 has a reflected XSS in delete.php via the id GET parameter, allowing session hijacking of an admin.

Vulnerability

Overview

A reflected cross-site scripting (XSS) vulnerability exists in SourceCodester Sales and Inventory System 1.0. The flaw is located in the /delete.php file, where the id GET parameter is reflected into the response without proper sanitization or encoding [1]. This allows an attacker to inject arbitrary JavaScript code.

Exploitation

To exploit the vulnerability, an attacker crafts a URL containing a malicious payload in the id parameter. The proof-of-concept URL http://127.0.0.1:8089/delete.php?id=%3CscrIpt%3Ealert%281%29%3B%3C%2FscRipt%3E&table=customer_details&return=view_customers.php demonstrates that the payload is executed in the victim's browser [1]. The attack requires the victim to be authenticated as an administrator, as the delete action typically requires admin privileges [1].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the administrator's session. This can lead to session hijacking by stealing session cookies, privilege escalation by performing actions on behalf of the admin (e.g., adding rogue accounts), or forcing the browser to make unintended state-changing requests [1].

Mitigation

As of the publication date (2026-04-08), no official patch has been released by SourceCodester [2]. The vendor's recommended to sanitize and encode all user-supplied input before reflecting it in responses. The exploit has been publicly published, increasing the risk of active use [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.