CVE-2026-32712
Open Source Point of Sale has Stored XSS in Customer Name (Sales)
Open Source Point of Sale is a web based point-of-sale application written in PHP using CodeIgniter framework. Prior to 3.4.3, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Daily Sales management table. The customer_name column is configured with escape: false in the bootstrap-table column configuration, causing customer names to be rendered as raw HTML. An attacker with customer management permissions can inject arbitrary JavaScript into a customer's first_name or last_name field, which executes in the browser of any user viewing the Daily Sales page. This vulnerability is fixed in 3.4.3.
| CWE | CWE-79 |
| Vendor | opensourcepos |
| Product | opensourcepos |
| Published | Apr 7, 2026 |
| Last Updated | Apr 8, 2026 |
Get instant alerts for opensourcepos opensourcepos
Be the first to know when new medium vulnerabilities affecting opensourcepos opensourcepos are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N