CVE-2026-7746
Description
A vulnerability was identified in SourceCodester Web-based Pharmacy Product Management System 1.0. Affected is an unknown function of the file /product_expiry/edit-admin.php. Such manipulation of the argument ID leads to sql injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
SQL injection in SourceCodester Pharmacy Product Management System 1.0 allows authenticated remote attackers to execute arbitrary SQL via the id parameter in edit-admin.php.
Vulnerability
Details
A SQL injection vulnerability exists in SourceCodester Web-based Pharmacy Product Management System 1.0. The flaw resides in the /product_expiry/edit-admin.php file, where the id parameter is directly concatenated into SQL queries without proper sanitization or prepared statements. This root cause enables an attacker to inject malicious SQL payloads through the vulnerable parameter [1].
Exploitation
The attack is remotely exploitable, but requires an authenticated session with a valid application account. In a local test environment, the vulnerability was confirmed using sqlmap, which successfully identified the injectable parameter and demonstrated DBMS identification, database enumeration, and data extraction capabilities [1]. No special network position beyond standard remote access is needed.
Impact
An authenticated attacker can execute arbitrary SQL commands on the backend database. This allows extraction of sensitive information (e.g., user credentials, pharmacy records, inventory data), modification of database content, and potential escalation to server-side compromise depending on database permissions. The exploit is publicly available, increasing the risk of active exploitation [1].
Mitigation
As of the publication date (2026-05-04), no official patch has been released by SourceCodester. Users should implement strict input validation and parameterized queries (prepared statements) in the affected file. Additionally, applying general security best practices (e.g., least privilege for database accounts) can reduce the impact. Until a fix is available, the system remains vulnerable to authenticated SQL injection attacks [1].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.