{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7264","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-28T05:23:13.636Z","datePublished":"2026-04-28T09:30:14.143Z","dateUpdated":"2026-04-28T09:30:14.143Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-28T09:30:14.143Z"},"title":"SourceCodester Pizzafy Ecommerce System ajax.php get_cart_items sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"SQL Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"SourceCodester","product":"Pizzafy Ecommerce System","versions":[{"version":"1.0","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A weakness has been identified in SourceCodester Pizzafy Ecommerce System 1.0. Impacted is the function get_cart_items of the file /admin/ajax.php?action=get_cart_items. Executing a manipulation of the argument ID can lead to sql injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-04-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-28T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-28T07:28:33.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Fernando Mengali (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359915","name":"VDB-359915 | SourceCodester Pizzafy Ecommerce System ajax.php get_cart_items sql injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359915/cti","name":"VDB-359915 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/802437","name":"Submit #802437 | SourceCodester Pizzafy Ecommerce System 1.0 SQL Injection","tags":["third-party-advisory"]},{"url":"https://github.com/fernando-mengali/vulndb-submissions/blob/main/06-vul-SQLI.md","tags":["exploit"]},{"url":"https://www.sourcecodester.com/","tags":["product"]}],"tags":["x_freeware"]}}}