OpenCart 3.0.3.3

CPE Details

OpenCart 3.0.3.3
3.0.3.3
2020-06-11
16h42 +00:00
2020-06-11
16h42 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:opencart:opencart:3.0.3.3:*:*:*:*:*:*:*

Informations

Vendor

opencart

Product

opencart

Version

3.0.3.3

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-1749 2025-02-28 13h43 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/voucher.
4.7
Medium
CVE-2025-1748 2025-02-28 13h43 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register.
4.7
Medium
CVE-2025-1747 2025-02-28 13h42 +00:00 HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/login.
4.7
Medium
CVE-2025-1746 2025-02-28 13h38 +00:00 Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.
6.1
Medium
CVE-2020-13980 2020-06-09 11h44 +00:00 OpenCart 3.0.3.3 allows remote authenticated users to conduct XSS attacks via a crafted filename in the users' image upload section because of a lack of entity encoding. NOTE: this issue exists because of an incomplete fix for CVE-2020-10596. The vendor states "this is not a massive issue as you are still required to be logged into the admin.
4.8
Medium