CVE-2026-4570
Published: 23 March 2026
Summary
CVE-2026-4570 is a medium-severity Injection (CWE-74) vulnerability in Ahsanriaz26Gmailcom Sales And Inventory System. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 9.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents SQL injection by requiring validation and sanitization of the 'searchtxt' input parameter in /view_customers.php before database processing.
SI-2 mandates timely identification, reporting, and remediation of the SQL injection flaw in the HTTP POST handler of /view_customers.php.
RA-5 requires vulnerability scanning to detect SQL injection vulnerabilities like CVE-2026-4570 in the affected system and initiate risk-based remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in network-accessible web app directly enables T1190 exploitation and facilitates T1213.006 database data access.
NVD Description
A vulnerability was identified in SourceCodester Sales and Inventory System 1.0. Affected is an unknown function of the file /view_customers.php of the component HTTP POST Request Handler. Such manipulation of the argument searchtxt leads to sql injection. The attack can…
more
be executed remotely. The exploit is publicly available and might be used.
Deeper analysisAI
CVE-2026-4570 is a SQL injection vulnerability in the SourceCodester Sales and Inventory System 1.0. The flaw affects an unknown function within the file /view_customers.php, specifically in the HTTP POST Request Handler component. By manipulating the 'searchtxt' argument, attackers can inject malicious SQL payloads, as classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-89 (SQL Injection). The vulnerability carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) and was published on 2026-03-23.
The vulnerability can be exploited remotely by an attacker with low privileges (PR:L), requiring network access but low complexity and no user interaction. Successful exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or disruption within the affected system's database.
Advisories from VulDB (ctiid.352407, id.352407, submit.775165) document the issue and reference a public proof-of-concept exploit available on GitHub at https://github.com/meifukun/Web-Security-PoCs/blob/main/Inventory-System/SQLi-ViewCustomers-searchtxt.md. No patches or specific mitigations are detailed in the provided references, though the vendor site at https://www.sourcecodester.com/ hosts the affected software.
The exploit is publicly available and might be used in real-world attacks, increasing the risk for unpatched instances of the system.
Details
- CWE(s)