| Title | SourceCodester Sales and Inventory System 1.0 SQL Injection |
|---|
| Description | A SQL Injection vulnerability was discovered in version 1.0 of the Inventory System. The issue affects the view_category.php component. The application fails to properly sanitize the searchtxt parameter within HTTP POST requests used by the category search functionality. This flaw permits an authenticated attacker to inject and execute arbitrary SQL commands. As the backend DBMS is MySQL, the vulnerability can be exploited using UNION-based, Boolean-based blind, and Time-based blind techniques, ultimately allowing attackers to exfiltrate sensitive database content and enumerate the backend database structure. |
|---|
| Source | ⚠️ https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-ViewCategory-searchtxt.md |
|---|
| User | Anonymous User |
|---|
| Submission | 03/08/2026 15:10 (1 month ago) |
|---|
| Moderation | 03/22/2026 09:42 (14 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 352406 [SourceCodester Sales and Inventory System 1.0 HTTP POST Request /view_category.php searchtxt sql injection] |
|---|
| Points | 20 |
|---|