Home

Description

A vulnerability was detected in opensourcepos Open Source Point of Sale up to 3.4.2. This issue affects the function getPicThumb of the file app/Controllers/Items.php. The manipulation of the argument pic_filename results in path traversal. The attack may be launched remotely. The patch is identified as def0c27a0e252668df8d942fc31e16d1edfd7323. A patch should be applied to remediate this issue. The vendor was contacted early about this disclosure.

PUBLISHED Reserved 2026-05-18 | Published 2026-05-18 | Updated 2026-05-18 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:X/RL:O/RC:C
4.0AV:N/AC:L/Au:S/C:P/I:N/A:N/E:ND/RL:OF/RC:C

Problem types

Path Traversal

Product status

3.4.0
affected

3.4.1
affected

3.4.2
affected

Timeline

2026-05-18:Advisory disclosed
2026-05-18:VulDB entry created
2026-05-18:VulDB entry last update

Credits

Kamran Saifullah (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/364435 (VDB-364435 | opensourcepos Open Source Point of Sale Items.php getPicThumb path traversal) vdb-entry technical-description

vuldb.com/vuln/364435/cti (VDB-364435 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/802559 (Submit #802559 | opensourcepos Open Source Point of Sale 3.4.1 Path Traversal) third-party-advisory

github.com/...rcepos/security/advisories/GHSA-xq63-3v4g-39r5 broken-link

github.com/opensourcepos/opensourcepos/pull/4545 issue-tracking patch

github.com/...ommit/def0c27a0e252668df8d942fc31e16d1edfd7323 patch

cve.org (CVE-2026-8802)

nvd.nist.gov (CVE-2026-8802)

Download JSON