OpenCart 2.3.0.0

CPE Details

OpenCart 2.3.0.0
2.3.0.0
2019-04-25
17h20 +00:00
2019-04-25
17h20 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:opencart:opencart:2.3.0.0:*:*:*:*:*:*:*

Informations

Vendor

opencart

Product

opencart

Version

2.3.0.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-1749 2025-02-28 13h43 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/voucher.
4.7
Medium
CVE-2025-1748 2025-02-28 13h43 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register.
4.7
Medium
CVE-2025-1747 2025-02-28 13h42 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/login.
4.7
Medium
CVE-2025-1746 2025-02-28 13h38 +00:00 Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
6.1
Medium
CVE-2020-20491 2023-06-19 22h00 +00:00 SQL injection vulnerability in OpenCart v.2.2.00 thru 3.0.3.2 allows a remote attacker to execute arbitrary code via the Fba plugin function in upload/admin/index.php.
7.2
High
CVE-2018-13067 2018-07-02 15h00 +00:00 /upload/catalog/controller/account/password.php in OpenCart through 3.0.2.0 has CSRF via the index.php?route=account/password URI to change a user's password.
8.8
High
CVE-2018-11494 2018-05-26 18h00 +00:00 The "program extension upload" feature in OpenCart through 3.0.2.0 has a six-step process (upload, install, unzip, move, xml, remove) that allows attackers to execute arbitrary code if the remove step is skipped, because the attacker can discover a secret temporary directory name (containing 10 random digits) via a directory traversal attack involving language_info['code'].
8
High
CVE-2018-11495 2018-05-26 18h00 +00:00 OpenCart through 3.0.2.0 allows directory traversal in the editDownload function in admin\model\catalog\download.php via admin/index.php?route=catalog/download/edit, related to the download_id. For example, an attacker can download ../../config.php.
4.9
Medium