Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. opensourcepos 3.4.0 and 3.4.1 has a stored XSS vulnerability exists in the Configuration (Information) functionality. An authenticated user with the permission “Configuration: Change OSPOS's Configuration” can inject a malicious JavaScript payload into the Company Name field when updating Information in Configuration. The malicious payload is stored and later triggered when a user accesses /sales/complete. First select Sales, and choose New Item to create an item, then click on Completed . Due to insufficient input validation and output encoding, the payload is rendered and executed in the user’s browser, resulting in a stored XSS vulnerability. This vulnerability is fixed in 3.4.2.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 Jan 2026 03:45:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:opensourcepos:open_source_point_of_sale:*:*:*:*:*:*:*:*

Thu, 15 Jan 2026 04:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 20:15:00 +0900

Type Values Removed Values Added
First Time appeared Opensourcepos
Opensourcepos open Source Point Of Sale
Vendors & Products Opensourcepos
Opensourcepos open Source Point Of Sale

Wed, 14 Jan 2026 06:45:00 +0900

Type Values Removed Values Added
Description Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. opensourcepos 3.4.0 and 3.4.1 has a stored XSS vulnerability exists in the Configuration (Information) functionality. An authenticated user with the permission “Configuration: Change OSPOS's Configuration” can inject a malicious JavaScript payload into the Company Name field when updating Information in Configuration. The malicious payload is stored and later triggered when a user accesses /sales/complete. First select Sales, and choose New Item to create an item, then click on Completed . Due to insufficient input validation and output encoding, the payload is rendered and executed in the user’s browser, resulting in a stored XSS vulnerability. This vulnerability is fixed in 3.4.2.
Title Open Source Point of Sale (opensourcepos) Stored XSS in Configuration (Information) – Company Name field
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-14T19:11:13.050Z

Reserved: 2025-12-22T17:55:15.946Z

Link: CVE-2025-68658

cve-icon Vulnrichment

Updated: 2026-01-14T19:11:09.198Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T22:16:06.293

Modified: 2026-01-21T18:40:12.790

Link: CVE-2025-68658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-14T20:08:13Z

Weaknesses