CVE-2026-32888 PUBLISHED

Open Source Point of Sale is Vulnerable to SQL Injection Through its Item Search Functionality

Assigner: GitHub_M
Reserved: 16.03.2026 Published: 20.03.2026 Updated: 20.03.2026

Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom filter), user-supplied input from the search GET parameter is interpolated directly into a HAVING clause without parameterization or sanitization. This allows an authenticated attacker with basic item search permissions to execute arbitrary SQL queries. A patch did not exist at the time of publication.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor opensourcepos
Product opensourcepos
Versions
  • Version <= 3.4.1 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE