SQL Injection Flaw Found in Pharmacy System: Exploit Available
The National Vulnerability Database (NVD) has flagged a critical SQL injection vulnerability in SourceCodester Pharmacy Sales and Inventory System version 1.0. The flaw resides within the /ajax.php?action=delete_sales endpoint, specifically when handling the ID argument. Attackers can exploit this by manipulating the ID parameter to inject malicious SQL code, potentially leading to unauthorized data access or modification.
This vulnerability, cataloged as CVE-2026-6188, carries a CVSS score of 7.3 (HIGH). The NVD notes that the attack can be initiated remotely and requires no specific privileges or user interaction, making it a significant threat. Crucially, the exploit code for this vulnerability has already been published, increasing the likelihood of active exploitation in the wild.
Given the availability of the exploit and the ease of remote execution, organizations utilizing SourceCodester Pharmacy Sales and Inventory System 1.0 should treat this as an immediate risk. The NVD associates this vulnerability with CWE-74 (Improper Neutralization of Special Elements in Output Used as a Security Construct) and CWE-89 (Improper Neutralization of Special Elements used in SQL Commands).
Related ATT&CK Techniques
🛡️ Detection Rules
6 rules · 5 SIEM formats6 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Web Application Exploitation Attempt — CVE-2026-6188
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
6 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6188 | SQLi | SourceCodester Pharmacy Sales and Inventory System version 1.0 |
| CVE-2026-6188 | SQLi | Vulnerable file: /ajax.php?action=delete_sales |
| CVE-2026-6188 | SQLi | Vulnerable parameter: ID in /ajax.php?action=delete_sales |