VYPR
Medium severity6.3NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7267

CVE-2026-7267

Description

A flaw has been found in SourceCodester Pizzafy Ecommerce System 1.0. This affects an unknown function of the file /view_prod.php. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in SourceCodester Pizzafy Ecommerce System 1.0 via unsanitized 'id' parameter in /view_prod.php allows remote data extraction.

Vulnerability

Details CVE-2026-7267 describes a SQL injection vulnerability in SourceCodester Pizzafy Ecommerce System version 1.0. The flaw resides in the /view_prod.php script, where the id parameter is directly concatenated into a SQL query without sanitization [1]. This error-based SQL injection enables attackers to manipulate the SELECT operation by injecting malicious SQL commands through the id parameter.

Exploitation

The attack is remotely exploitable without authentication. An attacker simply sends a crafted HTTP GET request to /pizzafy/view_prod.php?id=<payload>. The provided proof of concept (PoC) demonstrates using extractvalue to trigger database errors that disclose sensitive information [1]. Because the application echoes MySQL errors, attackers can extract database schema, table names, and column structures through error messages.

Impact

Successful exploitation leads to full disclosure of the database, including user credentials and password hashes. Attackers can also delete or modify records, potentially causing denial of service or achieving privilege escalation via session hijacking [1]. The vulnerability is rated Medium (CVSS 6.3) but can have severe consequences if sensitive data is exposed.

Mitigation

As of the publication date, no patch is available from the vendor. The affected system is unpatched [1]. Users are advised to apply input validation and parameterized queries to mitigate the risk, or consider migrating to a supported alternative.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.