CVE-2026-32888 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 20, 2026
Open Source Point of Sale - SQL Injection
Overview
Open Source Point of Sale contains an SQL Injection caused by unsanitized user input in the Items search functionality's HAVING clause, letting authenticated attackers with item search permissions execute arbitrary SQL queries.
Severity & Score
Impact
Authenticated attackers can execute arbitrary SQL queries, potentially leading to data disclosure or modification.
Mitigation
Update to the latest version once a patch is available.
Social Media Activity(1 post)
š CVE-2026-32888 - High (8.8) Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Versions contain an SQL Injection in the Items search functionality. When the custom attribute search feature is enabled (search_custom ... š https://www.thehackerwire.com/vulnerability/CVE-2026-32888/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-32888
- Severity
- High
- CVSS Score
- 8.8
- Type
- sql_injection
- Status
- unconfirmed
- EPSS
- 2.5%
- Social Posts
- 1
CWE
- CWE-89
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H