No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in opensourcepos Open Source Point of Sale up to 3.4.2. This issue affects the function getPicThumb of the file app/Controllers/Items.php. The manipulation of the argument pic_filename results in path traversal. The attack may be launched remotely. The patch is identified as def0c27a0e252668df8d942fc31e16d1edfd7323. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure. | |
| Title | opensourcepos Open Source Point of Sale Items.php getPicThumb path traversal | |
| First Time appeared |
Opensourcepos
Opensourcepos open Source Point Of Sale |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:opensourcepos:open_source_point_of_sale:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Opensourcepos
Opensourcepos open Source Point Of Sale |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-18T10:00:14.027Z
Reserved: 2026-05-18T04:37:48.556Z
Link: CVE-2026-8802
No data.
No data.
No data.
OpenCVE Enrichment
No data.