PatchSiren cyber security CVE debrief
CVE-2026-8802 opensourcepos CVE debrief
CVE-2026-8802 describes a path traversal flaw in OpenSourcePOS Open Source Point of Sale up to version 3.4.2. The issue is in `getPicThumb` within `app/Controllers/Items.php`, where the `pic_filename` argument can be manipulated to reach unintended file paths. The vulnerability is remotely reachable and has a published fix in commit `def0c27a0e252668df8d942fc31e16d1edfd7323`. NVD lists the issue as CWE-22 with a CVSS 4.0 vector that indicates network access and low privileges, and the overall severity is MEDIUM (5.3).
- Vendor
- opensourcepos
- Product
- Open Source Point of Sale
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-18
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-18
- Advisory updated
- 2026-05-18
Who should care
Teams running OpenSourcePOS installations up to 3.4.2, especially administrators, application owners, and security teams responsible for POS environments and any deployment that exposes the affected controller remotely.
Technical summary
The vulnerable code path is `getPicThumb` in `app/Controllers/Items.php`. According to the supplied record, attacker-controlled `pic_filename` input can lead to path traversal (CWE-22), allowing access to paths outside the intended directory boundary. The CVSS vector in the source indicates the issue is network-reachable and does not require user interaction, with low privileges involved. The reference commit `def0c27a0e252668df8d942fc31e16d1edfd7323`, the linked pull request, and the GitHub security advisory all point to the remediation path.
Defensive priority
Medium
Recommended defensive actions
- Apply the upstream fix associated with commit `def0c27a0e252668df8d942fc31e16d1edfd7323` or upgrade to a release that includes it.
- Review `app/Controllers/Items.php` and confirm `pic_filename` handling now constrains file access to the intended directory.
- Restrict access to the affected application surface to trusted users and networks where practical.
- Audit logs and file access behavior for unexpected image-path requests or unusual file reads around the affected endpoint.
- If you maintain a fork, backport the patch and validate it with internal testing before redeployment.
Evidence notes
Primary evidence comes from the NVD record and supplied references. The description states that `getPicThumb` in `app/Controllers/Items.php` is affected and that manipulation of `pic_filename` causes path traversal. NVD metadata lists CWE-22 and a CVSS 4.0 vector with network access and low privileges. The fix is referenced by commit `def0c27a0e252668df8d942fc31e16d1edfd7323`, the linked pull request `#4545`, and the GitHub advisory `GHSA-xq63-3v4g-39r5`.
Official resources
Published publicly on 2026-05-18 in the supplied CVE/NVD record. The source notes that the vendor was contacted early about the disclosure.