VYPR
Medium severity5.4NVD Advisory· Published Apr 8, 2026· Updated Apr 29, 2026

CVE-2026-5811

CVE-2026-5811

Description

A vulnerability was identified in SourceCodester Online Food Ordering System 1.0. Affected by this issue is the function save_product of the file /Actions.php of the component POST Parameter Handler. Such manipulation of the argument price leads to business logic errors. The attack may be performed from remote. The exploit is publicly available and might be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SourceCodester Online Food Ordering System 1.0 fails to validate the price parameter, allowing negative prices to be set to negative values and causing business logic errors.

Vulnerability

Overview

CVE-2026-5811 is a business logic vulnerability in SourceCodester Online Food Ordering System 1.0. The issue resides in the save_product function within /Actions.php, where the price parameter is not validated on the server side. This allows an administrator to set a product's price to a negative value (e.g., -10.99) via a crafted POST request [1].

Exploitation

An attacker with administrative access can exploit this flaw by sending a POST request to Actions.php?a=save_product with the price field set to a negative number. The application accepts the value without checking that it must be a positive number, and the negative price is stored in the database [1]. The attack is remote and does not require authentication beyond a valid admin session.

Impact

If a customer purchases a product with a negative price, the system may deduct the amount from the total bill instead of adding it, leading to financial discrepancies and billing errors. This corrupts the financial logic of the application and could result in incorrect order totals or revenue loss [1].

Mitigation

As of the publication date, no patch has been released by SourceCodester. The vendor's website [2] does not mention an update for this issue. Administrators should implement server-side validation to ensure the price parameter is a positive number. Given that a public exploit exists, this vulnerability may be added to CISA's Known Exploited Vulnerabilities (KEV) catalog in the future.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.