CVE-2026-6189
Published: 13 April 2026
Summary
CVE-2026-6189 is a high-severity Injection (CWE-74) vulnerability in Sourcecodester (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly and comprehensively prevents SQL injection by validating the Username input to the /ajax.php?action=login function before database processing.
Mandates timely identification, reporting, and remediation of the specific SQL injection flaw in the login function of the Pharmacy Sales and Inventory System.
Facilitates detection of SQL injection vulnerabilities like CVE-2026-6189 through scanning and drives patching to prevent exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a publicly accessible web application login endpoint (ajax.php) directly enables remote unauthenticated exploitation of a public-facing application.
NVD Description
A vulnerability has been found in SourceCodester Pharmacy Sales and Inventory System 1.0. The affected element is an unknown function of the file /ajax.php?action=login. Such manipulation of the argument Username leads to sql injection. It is possible to launch the…
more
attack remotely. The exploit has been disclosed to the public and may be used.
Deeper analysisAI
CVE-2026-6189 is a SQL injection vulnerability (CWE-74, CWE-89) in SourceCodester Pharmacy Sales and Inventory System 1.0. The flaw resides in an unknown function within the file /ajax.php?action=login, where manipulation of the Username argument triggers the injection.
The vulnerability is exploitable remotely by unauthenticated attackers requiring low attack complexity and no user interaction, per its CVSS 3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Exploitation enables limited impacts on confidentiality, integrity, and availability.
Advisories and references include a GitHub issue at https://github.com/lingzezzz/lingze/issues/1 disclosing the exploit, VulDB submission and vulnerability details at https://vuldb.com/submit/797377, https://vuldb.com/vuln/357111, and https://vuldb.com/vuln/357111/cti, along with the vendor site at https://www.sourcecodester.com/. The exploit has been publicly disclosed.
Details
- CWE(s)