CVE-2026-7194: SourceCodester Pharmacy System SQL Injection Publicly Exploitable

CVE-2026-7194: SourceCodester Pharmacy System SQL Injection Publicly Exploitable

The National Vulnerability Database has disclosed CVE-2026-7194, a high-severity SQL injection vulnerability affecting SourceCodester Pharmacy Sales and Inventory System version 1.0. This flaw resides in the /ajax.php?action=save_product file, where manipulating the ID argument allows for remote SQL injection. The critical concern here is that an exploit for this vulnerability has been made publicly available, significantly lowering the bar for attackers.

This isn’t a complex zero-day; it’s a straightforward SQLi that attackers can now weaponize with minimal effort. The CVSS score of 7.3 (HIGH) reflects the remote attack vector (AV:N) and the potential for partial confidentiality, integrity, and availability impacts (C:L/I:L/A:L). While specific affected products beyond version 1.0 aren’t detailed, any organization running this system should assume compromise is trivial.

Defenders need to recognize that public exploits transform theoretical risks into immediate threats. Attackers don’t need to be sophisticated; they just need to find exposed instances. This vulnerability, categorized under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Web Page) and CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), points to fundamental input validation failures. It’s a reminder that basic web application security hygiene remains paramount.

What This Means For You

  • If your organization uses SourceCodester Pharmacy Sales and Inventory System 1.0, you must consider it compromised. There's a public exploit. Immediately patch or take the system offline. Audit logs for suspicious activity, especially around `ajax.php?action=save_product` and database access.

Indicators of Compromise

IDTypeIndicator
CVE-2026-7194 SQLi SourceCodester Pharmacy Sales and Inventory System 1.0
CVE-2026-7194 SQLi /ajax.php?action=save_product
CVE-2026-7194 SQLi Manipulation of argument ID
🔎
Check latest vulnerability advisories Use /brief for an analyst-ready weekly threat summary with severity rankings and key IOCs.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 02:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7199: SQL Injection in Pharmacy Sales and Inventory System

CVE-2026-7199 — A vulnerability was detected in SourceCodester Pharmacy Sales and Inventory System 1.0. Affected by this vulnerability is an unknown functionality of the file...

vulnerabilityCVEhigh-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7196 — CodeAstro Online Classroom SQL Injection

CVE-2026-7196 — A security vulnerability has been detected in CodeAstro Online Classroom 1.0. Affected is an unknown function of the file /guestdetails. Such manipulation of...

vulnerabilityCVEmedium-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-41372 — OpenClaw before 2026.4.2 fails to normalize trailing-dot

CVE-2026-41372 — OpenClaw before 2026.4.2 fails to normalize trailing-dot localhost hosts in remote CDP discovery responses, allowing bypass of loopback protections. Attackers can craft hostile...

vulnerabilityCVEmedium-severitycwe-639
/SCW Vulnerability Desk /MEDIUM /5.8 /⚑ 2 IOCs /⚙ 1 Sigma