SQL Injection Flaw Found in Open Source Point of Sale
CVE Notify is flagging a critical SQL injection vulnerability, CVE-2026-32888, impacting Open Source Point of Sale (OSPOS), a PHP-based web application built on the CodeIgniter framework. The vulnerability lies within the item search functionality, specifically when the custom attribute search feature (search_custom filter) is active. According to CVE Notify, user input from the search GET parameter is directly inserted into a HAVING clause without proper sanitization or parameterization. This oversight allows an authenticated attacker, even with basic item search privileges, to craft malicious queries and execute arbitrary SQL commands against the database. At the time of the advisoryβs publication, a patch was not yet available, leaving instances of OSPOS exposed.
This exploit is particularly concerning because it targets an application handling sensitive sales and inventory data. An attacker could potentially exfiltrate customer information, manipulate sales records, or even compromise the integrity of the entire system. The reliance on unparameterized input in database queries is a classic, yet persistent, coding error that can have devastating consequences.
What This Means For You
- For organizations using Open Source Point of Sale, prioritize patching this vulnerability immediately once a fix is released by the developers. In the interim, consider disabling the 'search_custom' filter feature if possible and implement strict input validation and parameterized queries for all database interactions within your own custom code to prevent similar SQL injection attacks.
Related ATT&CK Techniques
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-32888 | SQLi | Open Source Point of Sale, affected versions not specified, Items search functionality, search_custom filter enabled, user-supplied input from search GET parameter interpolated into HAVING clause without sanitization. |
| CVE-2026-32888 | SQLi | Open Source Point of Sale, affected versions not specified, CodeIgniter framework, Items search functionality, search_custom filter enabled, user-supplied input from search GET parameter interpolated into HAVING clause without sanitization. |
π Recommended Tools
Found this interesting? Follow us to stay ahead.