### [CVE-2023-38890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38890) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary SQL commands/queries via the login form, leading to unauthorized access and potential data manipulation. This vulnerability arises due to insufficient validation of user-supplied input in the username field, enabling SQL Injection attacks. ### POC #### Reference - https://github.com/akshadjoshi/CVE-2023-38890 #### Github - https://github.com/akshadjoshi/CVE-2023-38890 - https://github.com/nomi-sec/PoC-in-GitHub