OpenSourcePOS 3.4.1 has a second order SQL Injection vulnerability in the handling of the currency_symbol configuration field. Although the input is initially stored without immediate execution, it is later concatenated into a dynamically constructed SQL query without proper sanitization or parameter binding. This allows an attacker with access to modify the currency_symbol value to inject arbitrary SQL expressions, which are executed when the affected query is subsequently processed.
References
| Link | Resource |
|---|---|
| https://github.com/hungnqdz/cve-research/blob/main/CVE-2026-26745.md | Exploit Mitigation Third Party Advisory |
| https://github.com/opensourcepos/opensourcepos | Product |
Configurations
History
No history.
Information
Published : 2026-02-20 17:25
Updated : 2026-02-24 20:45
NVD link : CVE-2026-26745
Mitre link : CVE-2026-26745
CVE.ORG link : CVE-2026-26745
JSON object : View
Products Affected
opensourcepos
- open_source_point_of_sale
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
