Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensourcepos open Source Point Of Sale
|
|
| CPEs | cpe:2.3:a:opensourcepos:open_source_point_of_sale:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opensourcepos open Source Point Of Sale
|
Wed, 25 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensourcepos
Opensourcepos opensourcepos |
|
| Vendors & Products |
Opensourcepos
Opensourcepos opensourcepos |
Fri, 20 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom filter), user-supplied input from the search GET parameter is interpolated directly into a HAVING clause without parameterization or sanitization. This allows an authenticated attacker with basic item search permissions to execute arbitrary SQL queries. A patch did not exist at the time of publication. | |
| Title | Open Source Point of Sale is Vulnerable to SQL Injection Through its Item Search Functionality | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-25T14:26:31.519Z
Reserved: 2026-03-16T21:03:44.421Z
Link: CVE-2026-32888
Updated: 2026-03-25T14:26:23.752Z
Status : Analyzed
Published: 2026-03-20T03:15:59.707
Modified: 2026-04-08T20:54:00.880
Link: CVE-2026-32888
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:29:43Z