CVE-2026-26706
Published: 02 March 2026
Summary
CVE-2026-26706 is a critical-severity SQL Injection (CWE-89) vulnerability in Oretnom23 Pharmacy Point Of Sale System. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 4.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Mandates validation of user inputs at system entry points, directly preventing SQL injection in /pharmacy/view_receipt.php by sanitizing or rejecting malicious SQL payloads.
Requires identification, prioritization, and remediation of flaws like this SQL injection vulnerability in the Pharmacy Point of Sale System v1.0.
Enforces restrictions on information inputs such as length, type, or format to /pharmacy/view_receipt.php, limiting opportunities for successful SQL injection attacks.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing web app (/view_receipt.php) directly enables T1190 for unauthenticated remote exploitation, arbitrary query execution, and high-impact data access/modification/deletion.
NVD Description
sourcecodester Pharmacy Point of Sale System v1.0 is vulnerable to SQL Injection in /pharmacy/view_receipt.php.
Deeper analysisAI
CVE-2026-26706, published on 2026-03-02, is an SQL injection vulnerability (CWE-89) in the sourcecodester Pharmacy Point of Sale System v1.0, specifically affecting the /pharmacy/view_receipt.php component. This flaw has a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical due to its potential for severe impact.
The vulnerability enables remote exploitation over the network by unauthenticated attackers with low complexity and no need for user interaction. Successful attacks can result in high confidentiality, integrity, and availability impacts, potentially allowing arbitrary SQL query execution, data extraction, modification, or deletion within the application's database.
Mitigation details are available in the referenced advisory at https://github.com/Thirtypenny77/bug_report/blob/main/sourcecodester/pharmacy-point-sale-system/SQL-3.md.
Details
- CWE(s)