OpenSourcePOS 3.4.1 has a second order SQL Injection vulnerability in the handling of the currency_symbol configuration field. Although the input is initially stored without immediate execution, it is later concatenated into a dynamically constructed SQL query without proper sanitization or parameter binding. This allows an attacker with access to modify the currency_symbol value to inject arbitrary SQL expressions, which are executed when the affected query is subsequently processed.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Feb 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSourcePOS 3.4.1 has a second order SQL Injection vulnerability in the handling of the currency_symbol configuration field. Although the input is initially stored without immediate execution, it is later concatenated into a dynamically constructed SQL query without proper sanitization or parameter binding. This allows an attacker with access to modify the currency_symbol value to inject arbitrary SQL expressions, which are executed when the affected query is subsequently processed. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-20T16:38:55.616Z
Reserved: 2026-02-16T00:00:00.000Z
Link: CVE-2026-26745
No data.
Status : Awaiting Analysis
Published: 2026-02-20T17:25:55.807
Modified: 2026-02-20T18:57:15.973
Link: CVE-2026-26745
No data.
OpenCVE Enrichment
No data.